TLP : CLEAR
Date : 16/02/2024
REF NO : CERT / 2024/02/13
Severity Level: High
Components Affected
Overview
Exploit in the wild has been detected for CVE-2024-21410, affecting Microsoft Exchange Server. The vulnerability could be exploited by sending a crafted request to steal user’s NTLM hash.
Proof of Concept exploit code is publicly available for CVE-2024-21413, affecting Microsoft Outlook. The vulnerability could be exploited by clicking on a malicious URL and execute arbitrary code.
Description
Vulnerable Product | Risk Level | Impacts | Notes |
Browser | Medium Risk | Remote Code Execution | |
Azure | Medium Risk | Remote Code Execution Elevation of Privilege Spoofing | |
Developer Tools | Medium Risk | Remote Code Execution Denial of Service | |
Windows | Medium Risk | Denial of Service Elevation of Privilege Information Disclosure Remote Code Execution Security Restriction Bypass Spoofing | CVE-2024-21351 is being exploited in the wild. The vulnerability allows a malicious actor to inject code into SmartScreen and potentially gain code execution, which could potentially lead to some data exposure, lack of system availability, or both.
CVE-2024-21412 is being exploited in the wild. The vulnerability could bypass Mark of the Web (MoTW) warnings in Windows. |
Extended Security Updates (ESU) | Medium Risk | Denial of Service Information Disclosure Remote Code Execution Elevation of Privilege Spoofing | |
Microsoft Dynamics | Medium Risk | Spoofing Information Disclosure | |
Microsoft Office | High Risk | Remote Code Execution Elevation of Privilege Information Disclosure | [Updated on 2024-02-16] CVE-2024-21413 Proof-Of-Concept is available in public. The vulnerability could be exploited by clicking a malicious URL and execute arbitrary code. |
System Center | Medium Risk | Elevation of Privilege | |
Exchange Server | High Risk | Elevation of Privilege | [Updated on 2024-02-16] CVE-2024-21410 is being exploited in the wild. The vulnerability could be exploited by sending a crafted request to steal user’s NTLM hash. |
Mariner | Low Risk |
Impact
Solution/ Workarounds
Before installation of the software, please visit the vendor web-site for more details.
Reference
Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.
Sri Lanka Computer Emergency Readiness Team | Coordination Centre