FortiGuard Labs Threat Research
FortiGuard Labs recently investigated an Elevation of Privilege vulnerability in Microsoft Outlook that can be exploited by sending a crafted email to a vulnerable version of the software. When the victim receives the email, an attempt to connect to an attacker’s device is triggered, resulting in the victim’s NTLMv2 hash being leaked.
The vulnerable property resides in the PidLidReminderFileParameter extended MAPI property, which specifies the filename of a sound to be played when a reminder for an object is overdue.
To trigger the vulnerability, the sender simply modifies the PidLidReminderFileParameter message property to point to a malicious UNC path in a calendar or task item invite. To replicate this vulnerability, we used the Outlook AppointmentItem object to customize a malicious appointment email in the Calendar folder.
No interaction from the recipient is required. Upon receipt of the email, an automatic reminder pop-up appears on the recipient’s device that triggers NTLM authentication behind the scenes. A request to access the UNC path via SMB to an untrusted network is initiated.
To obtain the NTLMv2 hash of the recipient during authentication, a MitM (Man in the Middle) attack can be set up to concurrently listen to and poison incoming requests. Using NTLM authentication, a bad actor can then use the exposed hashes to elevate their privileges in other systems, potentially gaining control of services unbeknownst to the email recipient.
Microsoft has released a script that checks for the presence of the PidLidReminderFileParameter message property in Exchange messaging items. This script provides the option to sanitize or fully remove items containing the vulnerable parameter.
Microsoft has also released an advisory for CVE-2023-23397 outlining the latest security updates. All users with a vulnerable version of Microsoft Outlook are encouraged to patch their systems immediately.
FortiGuard AntiVirus detects the malicious files identified in this report as:
FortiGuard IPS protects organizations with the following signature:
The FortiGuard AntiVirus service is supported by FortiGate, FortiMail, FortiClient, FortiEDR, and FortiProxy. The FortiGuard IPS service is supported by FortiGate. Customers running up-to-date versions of these products are protected.
Due to the ease of disruption, damage to daily operations, potential impact to an organization's reputation, and the unwanted destruction or release of PII, etc., it is essential to keep all AV and IPS signatures current.
This threat is delivered as an email attachment. FortiMail and FortiSandbox can detect and quarantine malicious attachments for such campaigns.
If you believe this or any other cybersecurity threat has impacted your organization, please contact our Global FortiGuard Incident Response Team.