CVE-2023-23397

CRITICAL KEV RANSOMWARE

Microsoft Outlook - Privilege Escalation

Title source: llm

Description

Microsoft Outlook Elevation of Privilege Vulnerability

Exploits (32)

nomisec WORKING POC 347 stars
by api0cradle · remote-auth
https://github.com/api0cradle/CVE-2023-23397-POC-Powershell
nomisec STUB 160 stars
by sqrtZeroKnowledge · infoleak
https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY
nomisec WORKING POC 127 stars
by Trackflaw · client-side
https://github.com/Trackflaw/CVE-2023-23397
nomisec WORKING POC 39 stars
by ka7ana · local
https://github.com/ka7ana/CVE-2023-23397
nomisec WORKING POC 25 stars
by tiepologian · client-side
https://github.com/tiepologian/CVE-2023-23397
nomisec WORKING POC 22 stars
by Muhammad-Ali007 · remote-auth
https://github.com/Muhammad-Ali007/OutlookNTLM_CVE-2023-23397
nomisec WORKING POC 14 stars
by BronzeBee · client-side
https://github.com/BronzeBee/cve-2023-23397
nomisec WORKING POC 9 stars
by djackreuter · client-side
https://github.com/djackreuter/CVE-2023-23397-PoC
nomisec WORKING POC 7 stars
by BillSkiCO · client-side
https://github.com/BillSkiCO/CVE-2023-23397_EXPLOIT
nomisec WORKING POC 7 stars
by vlad-a-man · client-side
https://github.com/vlad-a-man/CVE-2023-23397
nomisec WORKING POC 6 stars
by ahmedkhlief · client-side
https://github.com/ahmedkhlief/CVE-2023-23397-POC
nomisec WORKING POC 4 stars
by grn-bogo · infoleak
https://github.com/grn-bogo/CVE-2023-23397
nomisec WORKING POC 4 stars
by Pushkarup · remote
https://github.com/Pushkarup/CVE-2023-23397
nomisec WORKING POC 3 stars
by P4x1s · poc
https://github.com/P4x1s/CVE-2023-23397-POC
nomisec WORKING POC 3 stars
by alicangnll · poc
https://github.com/alicangnll/CVE-2023-23397
nomisec WORKING POC 2 stars
by ahmedkhlief · client-side
https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook
nomisec WORKING POC 1 stars
by Phaedrik · remote-auth
https://github.com/Phaedrik/CVE-2023-23397-POC
nomisec SCANNER 1 stars
by SecCTechs · poc
https://github.com/SecCTechs/CVE-2023-23397
nomisec WORKING POC 1 stars
by moneertv · poc
https://github.com/moneertv/CVE-2023-23397
nomisec SCANNER 1 stars
by j0eyv · poc
https://github.com/j0eyv/CVE-2023-23397
nomisec WORKING POC 1 stars
by TheUnknownSoul · client-side
https://github.com/TheUnknownSoul/CVE-2023-23397-PoW
nomisec WORKING POC
by stevesec · client-side
https://github.com/stevesec/CVE-2023-23397
nomisec WORKING POC
by Gilospy · client-side
https://github.com/Gilospy/CVE-2023-23397
nomisec WORKING POC
by Zeppperoni · poc
https://github.com/Zeppperoni/CVE-2023-23397-Patch
nomisec WRITEUP
by Cyb3rMaddy · poc
https://github.com/Cyb3rMaddy/CVE-2023-23397-Report
nomisec WRITEUP
by im007 · poc
https://github.com/im007/CVE-2023-23397
nomisec WRITEUP
by Symbolexe · poc
https://github.com/Symbolexe/CVE-2023-23397
nomisec WORKING POC
by jacquesquail · client-side
https://github.com/jacquesquail/CVE-2023-23397
patchapalooza WORKING POC
by asocsam · client-side
https://github.com/asocsam/offensive-red-team-projects
patchapalooza WORKING POC
by smnelson128 · client-side
https://gitlab.com/smnelson128/CVE-2023-23397

Scores

CVSS v3 9.8
EPSS 0.9364
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2023-03-14
VulnCheck KEV 2023-03-14
InTheWild.io 2023-03-14
ENISA EUVD EUVD-2023-27497
Ransomware Use Confirmed

Classification

CWE
CWE-20 CWE-294
Status published

Affected Products (6)

microsoft/365_apps
microsoft/office
microsoft/office_long_term_servicing_channel
microsoft/outlook
microsoft/outlook
microsoft/outlook

Timeline

Published Mar 14, 2023
KEV Added Mar 14, 2023
Tracked Since Feb 18, 2026