<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CVE-2023-23397 Archive - MEB-IT | Blog</title>
	<atom:link href="https://blog.meb-it.de/en/tags/cve-2023-23397/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.meb-it.de/en/tags/cve-2023-23397/</link>
	<description>Networking &#124; Security &#124; Cloud</description>
	<lastBuildDate>Sun, 26 Mar 2023 10:03:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2.2</generator>
	<item>
		<title>Howto check your M365/Exchange Online environment for messages exploiting CVE-2023-23397</title>
		<link>https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/</link>
					<comments>https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/#respond</comments>
		
		<dc:creator><![CDATA[Marcel]]></dc:creator>
		<pubDate>Thu, 16 Mar 2023 19:31:11 +0000</pubDate>
				<category><![CDATA[Allgemein]]></category>
		<category><![CDATA[CVE-2023-23397]]></category>
		<category><![CDATA[M365]]></category>
		<guid isPermaLink="false">https://blog.meb-it.de/?p=143</guid>

					<description><![CDATA[<p>You might have heard about CVE-2023-23397 a vulnerability targeting Microsoft Outlook. The exploit can be triggered without user interaction. The vulnerability seems easy to exploit. Fortunately, you can simply protect yourself: Update Outlook/Office Apps and you are good. But how can we make sure we have not been exploited by that vulnerability? Microsoft has released [&#8230;]</p>
<p>Der Beitrag <a rel="nofollow" href="https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/">Howto check your M365/Exchange Online environment for messages exploiting CVE-2023-23397</a> erschien zuerst auf <a rel="nofollow" href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>You might have heard about <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397" target="_blank" rel="noreferrer noopener">CVE-2023-23397</a> a vulnerability targeting Microsoft Outlook. The exploit can be triggered without user interaction. The vulnerability seems easy to exploit. Fortunately, you can simply protect yourself: Update Outlook/Office Apps and you are good.</p>



<p>But how can we make sure we have not been exploited by that vulnerability? Microsoft has <a href="https://microsoft.github.io/CSS-Exchange/Security/CVE-2023-23397/" target="_blank" rel="noreferrer noopener">released a script</a> for local Exchange installations as well for Exchange Online/ Microsoft 365.</p>



<p>This blog post shows how to use the Script to identify potential malicious mails in M365.</p>



<p>First we need to start Powershell as administrator. After that we install the AzureAD module:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator&gt; Install-Module AzureAD</code></pre>



<p>Powershell will then ask if the module should be installed from an external source. Please select Yes (Y) here.</p>



<p>Next, we need to install the Exchange Online module:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator&gt; Install-Module -Name ExchangeOnlineManagement -RequiredVersion 3.1.0</code></pre>



<p>Powershell will then ask again if the module should be installed from an external source. Please select Yes (Y) again.</p>



<p>The script used in the following step can be downloaded <a href="https://github.com/microsoft/CSS-Exchange/releases/latest/download/CVE-2023-23397.ps1" target="_blank" rel="noreferrer noopener">from here</a>.</p>



<p>Now we need to create an AzureAD application, which is needed to check the mailboxes:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator\Downloads&gt; .\CVE-2023-23397.ps1 -CreateAzureApplication</code></pre>



<p>Depending on the Powershell configuration, it may be necessary to confirm again that the script may be executed. You can either chose (M) or (A). I recommend chosing M.</p>



<p>A new window will open to log in to M365 as a global administrator or application administrator.</p>



<p> If your output is similar to the following creating the helper application has worked:</p>



<pre class="wp-block-code"><code>CVE-2023-23397 script version 23.03.15.2119

Prompting user for authentication, please minimize this window if you do not see an authorization prompt as it may be in the background

Adding user adminuser@yourtenant.com as owner of CVE-2023-23397Application

Setting Azure AD Permissions

Assigning Necessary Azure AD Service Roles
Application created with required permissions. Client ID: xxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx</code></pre>



<p>After this step we now can start the investigation. We need to connect to Exchange Online first:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator\Downloads&gt; Connect-ExchangeOnline</code></pre>



<p>You might need to re-authenticate at this point to M365. (I did not need to log in again at this step)</p>



<p>And then we can start the Powershell script to search for malicious files (If you selected (M) when running the script for the first time, you must confirm execution again now):</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator\Downloads&gt; Get-Mailbox -ResultSize Unlimited | .\CVE-2023-23397.ps1 -Environment "Online"</code></pre>



<p>At this point it is mandatory to authenticate again. Output should be similar to the following:</p>



<pre class="wp-block-code"><code>CVE-2023-23397 script version 23.03.15.2119
Trying to find Microsoft.Exchange.WebServices.dll in the script folder
Microsoft.Exchange.WebServices.dll wasn't found - attempting to download it from the internet

Prompting user for authentication, please minimize this window if you do not see an authorization prompt as it may be in the background

Waiting 60 seconds for app credentials to register..

Continuing...
Scanning 1 of 16 mailboxes (currently: mailbox1@yourtenant.com)
Scanning 2 of 16 mailboxes (currently: mailbox2@yourtenant.com)
Scanning 3 of 16 mailboxes (currently: mailbox3@yourtenant.com)
Scanning 4 of 16 mailboxes (currently: mailbox4@yourtenant.com)
Scanning 5 of 16 mailboxes (currently: mailbox5@yourtenant.com)
&#91;...]
Scanning 16 of 16 mailboxes (currently: mailbox16@yourtenant.com)
<strong>No vulnerable item found</strong>

Do you have feedback regarding the script? Please email ExToolsFeedback@microsoft.com.</code></pre>



<p>I hope you will see the same output as I do. The script also supports deleting affected files. For more information please look at <a href="https://microsoft.github.io/CSS-Exchange/Security/CVE-2023-23397/" target="_blank" rel="noreferrer noopener">Microsofts script documentation</a>.</p>



<p>After checking the mailboxes, we no longer need the AzureAD Helper Application. To delete the application just run the following command:</p>



<pre class="wp-block-code"><code>PS C:\Users\Administrator\Downloads&gt; .\CVE-2023-23397.ps1 -DeleteAzureApplication</code></pre>



<p>You have probably already guessed: First you have to allow the script again and thereafter you have to authenticate to Microsoft 365 a last time <img src="https://s.w.org/images/core/emoji/14.0.0/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<p></p>



<p></p>



<p>I hope the explanation helped you to check your tenants. Feel free to let me know if it worked or if you had any problems with it.</p>
<p>Der Beitrag <a rel="nofollow" href="https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/">Howto check your M365/Exchange Online environment for messages exploiting CVE-2023-23397</a> erschien zuerst auf <a rel="nofollow" href="https://blog.meb-it.de/en">MEB-IT | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.meb-it.de/en/howto-check-your-m365-exchange-online-environment-for-messages-exploiting-cve-2023-23397/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
