# [CVE-2023-23397] Vulnerability Details ๐Ÿšจ๐Ÿ’ป
Microsoft has recently addressed a set of critical security vulnerabilities, including this zero-day exploits: CVE-2023-23397. The Common Vulnerability Scoring System (CVSS) assigned score of 9.8 to this exploit.

## CVE-2023-23397: Elevation of Privilege in Microsoft Outlook ๐Ÿ“ง๐Ÿ”“

A significant elevation of privilege (EoP) vulnerability has been identified in Microsoft Outlook. This flaw can have severe consequences as it enables attackers to exploit an Extended Messaging Application Programming Interface (MAPI) attribute containing a Universal Naming Convention (UNC) path in a malicious message. When the victim opens the message, the vulnerability triggers, directing them to an attacker-controlled Server Message Block (SMB) share on TCP port 445.

No user action is required to exploit this critical vulnerability. Upon connecting to the attacker's SMB server, the victim's New Technology LAN Manager (NTLM) negotiation message is automatically sent. The attacker can leverage this to authenticate on other systems supporting NTLM authentication. Notably, online services like Microsoft 365 remain unaffected as they do not support NTLM authentication.

### Technical Details ๐Ÿ› ๏ธ

**NTLM (New Technology LAN Manager):** NTLM is a hash used for authentication. Obtaining the NTLM hash allows lateral movement within the compromised network, posing a significant security risk.

**MAPI (Messaging Application Programming Interface):** MAPI provides developers with functions to create mail-enabled applications, offering control over the mail system on the client computer, including mail creation, mailbox management, and more.

**UNC (Universal Naming Convention):** UNC is a naming system in Windows identifying network resources. A UNC path comprises double backslashes (\) followed by the computer name or IP address hosting the resource.

### Affected Versions ๐ŸŽฏ

The CVE-2023-23397 vulnerability impacts all currently supported versions of Microsoft Outlook for Windows, excluding Outlook for Android, iOS, or macOS. Microsoft recommends immediate patching to mitigate potential attacks.

Alternatively, if immediate patching is not feasible, Microsoft suggests adding users to the Protected Users group in Active Directory and blocking outbound SMB traffic on TCP port 445. These measures aim to minimize the impact of CVE-2023-23397.

### Active Exploitation ๐ŸŒ๐Ÿ•ต๏ธ

CERT-UA has reported this zero-day vulnerability to Microsoft, revealing active exploitation by threat actors associated with Russian intelligence services. Over the past year, these actors have targeted government, military, energy, and transportation organizations using this vulnerability.

# CVE-2023-23397 Exploit ๐ŸŒ๐Ÿ“ง
<img width="464" alt="image" src="">

## Description ๐Ÿš€

This script exploits CVE-2023-23397, a vulnerability in Microsoft Outlook, allowing the generation of malicious emails for testing and educational purposes.

## Features โœจ

- Generate malicious emails targeting Microsoft Outlook.
- Choose between saving the email as a .msg file or sending it directly.
- Menu-based user interaction for easy use.

## Prerequisites ๐Ÿ› ๏ธ

- Python 3.x ๐Ÿ
- Windows OS (due to the win32com.client dependency) ๐Ÿ–ฅ๏ธ

## Usage ๐Ÿš€

1. Clone the repository:

    git clone
    cd CVE-2023-23397

2. Install dependencies:

    pip install pywin32

    pip install -r requirements.txt

3. Run the script:


    Follow the on-screen prompts to enter the target email, attacker IP, and choose the action.

## Options โš™๏ธ

- `save`: Save the malicious email as a .msg file.
- `send`: Send the malicious email.

## License ๐Ÿ“

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.

## Disclaimer โš ๏ธ

This script is intended for educational and testing purposes only. Use responsibly and only on systems you have explicit permission to test.

## Contributing ๐Ÿค

If you'd like to contribute to this project, please open an issue or create a pull request.

## Contact

- GitHub: [Pushkar Upadhyay](
- LinkedIn: [Pushkar Upadhyay](

## Donations
### Show your support
- ETH: 0xB779767483831BD98327A449C78FfccE2cc6df0a
- USDT: 0xB779767483831BD98327A449C78FfccE2cc6df0a