CVE-2023-36786

7.2 HIGH

📋 TL;DR

CVE-2023-36786 is a remote code execution vulnerability in Skype for Business that allows an attacker to execute arbitrary code on a target system by sending specially crafted messages. This affects organizations using Skype for Business Server and Skype for Business clients. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Skype for Business Server
  • Skype for Business client
Versions: Skype for Business Server 2015, 2019, and Skype for Business client versions prior to security updates
Operating Systems: Windows Server, Windows client OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected Skype for Business versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining SYSTEM/administrator privileges, enabling data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Attacker gains initial foothold on a Skype for Business server or client, then escalates privileges to access sensitive communications data and pivot to other systems.

🟢

If Mitigated

Attack contained to isolated Skype for Business service account with limited system access if proper network segmentation and least privilege are implemented.

🌐 Internet-Facing: HIGH - Skype for Business servers exposed to internet are directly vulnerable to remote exploitation without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability to move laterally within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Microsoft has not disclosed technical details, but remote code execution vulnerabilities in communication software often have reliable exploitation paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply latest security updates from Microsoft's September 2023 Patch Tuesday or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36786

Restart Required: Yes

Instructions:

1. Download and install the latest security updates for Skype for Business Server from Microsoft Update Catalog. 2. Apply updates to all Skype for Business clients. 3. Restart affected servers and clients as required.

🔧 Temporary Workarounds

Network segmentation

all

Isolate Skype for Business servers from internet and restrict internal access to necessary users only

Disable unnecessary features

windows

Disable file transfer and other non-essential features in Skype for Business policies

Set-CsClientPolicy -Identity Global -DisableFileTransfer $true

🧯 If You Can't Patch

  • Implement strict network access controls to limit Skype for Business traffic to trusted sources only
  • Monitor for unusual Skype for Business activity and implement application allowlisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check Skype for Business Server and client versions against Microsoft's security update guidance. Unpatched versions prior to September 2023 updates are vulnerable.

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Skype for Business*'} | Select-Object Name, Version

Verify Fix Applied:

Verify that September 2023 or later security updates are installed and Skype for Business services are running updated binaries.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Skype for Business executables
  • Failed authentication attempts followed by successful connections
  • Abnormal file transfer or message patterns

Network Indicators:

  • Unusual outbound connections from Skype for Business servers
  • Anomalous protocol usage in Skype for Business traffic

SIEM Query:

source="SkypeForBusiness" AND (event_id=4688 OR process_creation) AND (parent_process="lync.exe" OR parent_process="rtc.exe")

🔗 References

📤 Share & Export