Researchers shared technical details about a flaw in Windows MSHTML platform, tracked as CVE-2023-29324, that could be abused to bypass security protections.
An attacker can exploit the vulnerability by crafting a malicious URL that would evade zone checks.
“An attacker can craft a malicious URL that would evade zone checks, resulting in a limited loss of integrity and availability of the victim machine” reads the advisory published by Microsoft.
This vulnerability affects all supported versions of Microsoft Windows, it was reported by the Security Researcher Ben Barnea from Akamai Technologies.
MapUrlToZone calls the function CreateUri which incorrectly converts the path ‘\.UNC\Akamai.comfile.wav’ to ‘/.//UNC//Akamai.com/file.wav’.
“MapUrlToZone is commonly used as a security measure. In particular, it was used to mitigate the critical Outlook vulnerability CVE-2023-23397 patched in the March Patch Tuesday.” reads the analysis published by Barnea. “An unauthenticated attacker on the internet could use the vulnerability to coerce an Outlook client to connect to an attacker-controlled server. This results in NTLM credentials theft. It is a zero-click vulnerability, meaning it can be triggered with no user interaction.”
Microsoft Threat Intelligence observed a Russian threat actor exploiting the CVE-2023-23397 flaw in targeted attacks against several organizations in the European government, transportation, energy, and military sectors, for approximately a year.
“This vulnerability is yet another example of patch scrutinizing leading to new vulnerabilities and bypasses. Specifically for this vulnerability, the addition of one character allows for a critical patch bypass.” concludes the expert.
We are in the final!
Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections where is reported Securityaffairs or my name Pierluigi Paganini
Please nominate Security Affairs as your favorite blog.
Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform
(SecurityAffairs – hacking, Windows MSHTML)
The post A zero-click vulnerability in Windows allows stealing NTLM credentials appeared first on Security Affairs.