CVE-2023-33140: Microsoft OneNote Spoofing Vulnerability

Overview

Severity
Medium (CVSS 6.5)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Category
Spoofing
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2023-Jun
Released
2023-06-13
Last Updated
2023-08-01
EPSS Score
5.53% (percentile: 90.3%)

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft OneNote and then click on a specially crafted URL to be compromised by the attacker. According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? Successful exploitation of this vulnerability enables an attacker to obtain a victim's NetNTLMv2 hashes thus impact to Confidentiality is High. Integrity and Availability are not impacted because the hashes do not directly enable an attacker to modify data or impact the victim's application or server runtime.

Affected Products (1)

Microsoft Office

  • Microsoft OneNote for Universal

Security Updates (1)

Acknowledgments

Jordan Hopkins - Rootshell Security

Revision History

  • 2023-06-13: Information published.
  • 2023-08-01: Added an FAQ. This is an information change only.