7.8
CVSSv3

CVE-2023-38831

Published: 23/08/2023 Updated: 23/10/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

RARLAB WinRAR prior to 6.23 allows malicious users to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rarlab winrar

Vendor Advisories

Check Point Reference: CPAI-2023-1380 Date Published: 18 Dec 2023 Severity: High ...

Exploits

This Metasploit module exploits a vulnerability in WinRAR (CVE-2023-38831) When a user opens a crafted RAR file and its embedded document, the decoy document is executed, leading to code execution ...
WinRAR version 622 suffers from a remote code execution vulnerability via a malicious zip archive ...

Github Repositories

Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.

OBTENCIÓN DE REVERSE SHELL EXPLOTANDO LA VULNERABILIDAD CVE-2023-38831 DE WINRAR En este repositorio vamos a explotar la vulnerabilidad CVE-2023-38831 de winrar de tal forma que podamos obtener una reverse shell desde la máquina víctima Windows a la máquina atacante Kali Linux PASOS PREVIOS Descargamos el contenido de este repositorio: A continuaci

An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23

RaRCE, Exploit generator for CVE-2023-38831 This is an easy to install and easy to use, versatile exploit generator for CVE-2023-38831, a vulnerability that affects WinRAR versions before 623 RARLabs WinRAR before 623 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive The issue occurs because a ZIP archive may in

Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.

OBTENCIÓN DE REVERSE SHELL EXPLOTANDO LA VULNERABILIDAD CVE-2023-38831 DE WINRAR En este repositorio vamos a explotar la vulnerabilidad CVE-2023-38831 de winrar de tal forma que podamos obtener una reverse shell desde la máquina víctima Windows a la máquina atacante Kali Linux PASOS PREVIOS Descargamos el contenido de este repositorio: A continuaci

CVE-2023-38831 winrar exploit generator Quick poc test Generate the default poc for test python cve-2023-38831-exp-genpy poc or python cve-2023-38831-exp-genpy CLASSIFIED_DOCUMENTSpdf scriptbat pocrar Custom Place the bait file and (evil) script file in the current directory, the bait file is recommended to be an image (png, jpg)

Proof-of-Concept for CVE-2023-38831 Zero-Day vulnerability in WinRAR

CVE-2023-38831 PoC This repository is just a Proof-of-Concept for CVE-2023-38831 Zero-Day vulnerability in WinRAR RARLabs WinRAR before 623 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive The issue occurs because a ZIP archive may include a benign file (such as an ordinary JPG file) and also a folder that has the s

DR. GANDALF: Aplicacion DESKTOP para WINDOWS, Inyector de archivos ZIP, generador de exploits para vulnerabilidad de WinRAR 6.22 y anteriores.

CVE-2023-38831 - Ejecución Remota de Código en WinRAR (RCE exploit) ANÁLISIS DE LA VULNERABILIDAD Y DESARROLLO DEL EXPLOIT DR GANDALF VULNERABILIDAD CVE-2023-38831 Este análisis se centra en la vulnerabilidad CVE-2023-38831, que afecta a la herramienta de compresión de archivos WinRAR en sus versiones 622 y anteriores Esta vulnerabilidad pe

Proof-of-Concept (POC) of CVE-2023-38831 Zero-Day vulnerability in WinRAR

CVE-2023-38831 (WinRAR) RARLabs WinRAR before 623 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive The issue occurs because a ZIP archive may include a benign file (such as an ordinary JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable co

CVE-2023-38831 PoC This is an easy to use exploit for the CVE-2023-38831 Usage Check vulnerable versions: Run the exploit: Get the shell:

CVE-2023-38831-WINRAR-EXPLOIT GENERATOR

WinrarExploit CVE-2023-38831 How to use? Execute script with commands pip install colorama windows: python winrar_exploitpy <bait-file(example: any pdf file and other) <OUTPUT_ARCHIVE_NAME> macos-linux and other: python3 winrar_exploitpy <bait-file(example: any pdf file and other) <OUTPUT_ARCHIVE_NAME>

winrar exploit 6.22 <=

CVE-2023-38831 winrar exploit 622 &lt;= Quick poc git clone githubcom/nhman-python/CVE-2023-38831git cd cd CVE-2023-38831 python3 pocpy poc example usage python3 simple_filetxt scriptbat outputzip example usage wwwyoutubecom/watch?v=-mN4tTKaMhQ

Convert Keylogpy to Keylogexe pip3 install pyinstaller pyinstaller --onefile keylogpy # CVE-2023-38831 winrar exploit generator Quick poc test Generate the default poc for test python cve-2023-38831-exp-genpy poc or python cve-2023-38831-exp-genpy CLASSIFIED_DOCUMENTSpdf scriptbat pocrar C

CVE-2023-38831 WinRAR

CVE-2023-38831 Vulnerable: WinRAR &lt;= 622 wwwwin-rarcom/ Usage: python3 cve-2023-38831py file_name payload_name archive_name Refs: wwwgroup-ibcom/blog/cve-2023-38831-winrar-zero-day/ xakepru/2023/08/24/winrar-0day/ Telegram: tme/pt_soft

Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)

Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) The Overview: Part-1

Proof of Concept (POC) for CVE-2023-38831 WinRAR

CVE-2023-38831 Vulnerable: WinRAR &lt;= 622 wwwwin-rarcom/

This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability.

CVE-2023-38831-Exploit-and-Detection This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability

CVE-2023-38831 winrar exploit builder

CVE-2023-38831 Builder Quick exploit builder for CVE-2023-38831, a vulnerability that affects WinRAR versions before 623 I created this exploit builder mainly to learn rust language, so don't expect to find clean and optimized code Info about this vulnerability wwwgroup-ibcom/blog/cve-2023-38831-winrar-zero-day/

Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerability

CVE-2023-38831-WinRAR-Exploit Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerability Usage: python pocpy &lt;BAIT_FILENAME&gt; &lt;SCRIPT_FILENAME&gt; &lt;OUTPUT_FILENAME&gt; Example: python pocpy cute_picturejpg exploitbat outputrar PoC Video: youtube/TRe0eGIsB5k

KQL Hunting for WinRAR CVE-2023-38831

CVE-2023-38831 - WinRAR File Extension Spoofing Vulnerability Description Cybercriminals have exploited a vulnerability allowing them to spoof file extensions This means they can hide the launch of malicious scripts within archives pretending to be common file types such as jpg, txt, etc This vulnerability was reported to both RARLAB and MITRE Corporation, with the latter a

CVE-2023-38831 winrar exploit generator

CVE-2023-38831 winrar exploit generator Quick poc test Generate the default poc for test python cve-2023-38831-exp-genpy poc or python cve-2023-38831-exp-genpy CLASSIFIED_DOCUMENTSpdf scriptbat pocrar Custom Place the bait file and (evil) script file in the current directory, the bait file is recommended to be an image (png, jpg)

This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code.

CVE-2023-38831 Winrar Exploit Generator (POC) This is a basic proof of concept for the CVE-2023-3883 exploit targeting WinRAR up to 622 Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code Description from CVEmitreorg: RARLabs WinRAR before 623 allows attackers to execute arbitrary code

CVE-2023-38831 En este caso, os comparto los archivos necesarios para poder explotar esta vulnerabilidad en winrar, con la cual podemos crear un PDF malicioso para entablarnos una reverse shell a nuestra máquina de atacantes ⚠️ NOTA: Este contenido esta compartido con fines Éticos y esta creado para prácticar en Entornos Controlados sin dañar a

CVE-2023-38831 - RARLAB WinRAR Code Execution Vulnerability ⚠️ For educational and authorized security research purposes only Original Exploit Authors Very grateful to the original PoC author b1tg and Group-IB Threat Intelligence Description RARLabs WinRAR before 623 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP arc

CVE-2023-38831 winrar exploit generator Quick poc test Generate the default poc for test python cve-2023-38831-exp-genpy poc or python cve-2023-38831-exp-genpy CLASSIFIED_DOCUMENTSpdf scriptbat pocrar Custom Place the bait file and (evil) script file in the current directory, the bait file is recommended to be an image (png, jpg)

CVE-2023-38831 PoC (Proof Of Concept)

CVE-2023-38831 PoC (Proof Of Concept) This is an easy to use exploit for CVE-2023-38831, a vulnerability that affects WinRAR versions before 623 An exploitable vulnerability has been identified in RARLabs WinRAR versions prior to 623 This vulnerability enables attackers to execute arbitrary code through a specifically crafted ZIP archive The vulnerability arises due to th

Proof-of-Concept (POC) of CVE-2023-38831 Zero-Day vulnerability in WinRAR

CVE-2023-38831 (WinRAR) RARLabs WinRAR before 623 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive The issue occurs because a ZIP archive may include a benign file (such as an ordinary JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable co

This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.

WinRAR-CVE-2023-38831 This Metasploit module exploits a vulnerability in WinRAR 622 (CVE-2023-38831) When a user opens a crafted RAR file and its embedded document, the decoy document is executed, leading to code execution It is not pretty, but works 🤷🏻 Alexander Hagenah @xaitax

CVE-2023-38831 WinRaR Exploit Generator

CVE-2023-38831 Exploit - Bait and Switch Archive Generator Overview This Python script is designed to generate a "bait and switch" archive file It is meant for educational and ethical hacking purposes only Please ensure that you have the necessary permissions before using this script A "bait and switch" archive is an archive that contains two different ve

lazy way to create CVE-2023-38831 winrar file for testing

winrar_CVE-2023-38831_lazy_poc lazy way to create CVE-2023-38831 winrar file for testing Article that mentioned this vuln and the sample: wwwgroup-ibcom/blog/cve-2023-38831-winrar-zero-day/ version of winrar i was using is winrar 5910 I took a malicious winrar file (049af32f678da5e344315ce46787e8fc gistgithubcom/BoredHackerBlog/83cd5ca743189bf72b28ebaabe3c

Infected version: winrar <= 6.22 have 0 day vulnerability which can lead to RCE in Windows.

⚡⚡ Winrar 0-day RCE (Remote Code Execution) Exploitation ⚡ CVE-2023-38831 Infected version: winrar &amp;lt;= 622 have 0-day vulnerability which can lead to RCE in Windows Machine 💥 pic 1 : executing the payload which is binded in the ssh_pentestpdf file My Winrar software version is 561

A home for detection content developed by the delivr.to team

Detections This repo serves as a home for detection content developed by the delivrto team All rules present in this repo have corresponding payloads (linked in references and shown below) that can be used to test detection content The repo currently holds the following types of detections: Sublime Rules Yara Rules Sigma Rules Sublime Rules Below is the list of rules for S

This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability.

CVE-2023-38831-Exploit-and-Detection This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability

Config files for my GitHub profile.

Mayteelsoon Guerra Castilla - Exploit Developer &amp; Reverse Engineer ¡Hola! Soy Mayteelsoon Guerra Castilla, un Exploit Developer y Reverse Engineer apasionado por la ingeniería inversa, el desarrollo de exploits, pruebas de penetración y el análisis de malware A lo largo de mi carrera, he trabajado en la creación de exploits y en la ide

一款用于生成winrar程序RCE(即cve-2023-38831)的POC的工具。

项目介绍 这是一款go语言些的用于生成cve-2023-38831漏洞POC的工具 影响版本:WinRAR &lt;623 如何使用? 编译 go build cve-2023-38831go 使用 cve-2023-38831exe 1234jpg payloadcmd poczip 其中1234jpg可以是任何文件修改的结果,我这里直接使用的1

CVE-2023-38831 winrar exploit generator and get reverse shell

CVE-2023-38831-winrar-expoit-simple-Poc Very important I hope you see this link first [githubcom/b1tg/CVE-2023-38831-winrar-exploit] I did not write the full exploit He wrote the exploit [githubcom/b1tg] All he did was modify something simple to get a Reverse Shell through the scriptbat file How To Run python cve-2023-38831-exp-genpy &lt;file name pdf,

This is my malware

VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC This is my malware I use the CVE 2023-38831, a kind of exploit on WinRAR, to do this malware I also use BypassUAC to get Administrator authority Disclaimer I make this malware just want to show the CVE 2023-38831 and bypass-UAC Please don't use this to do something illegal If you do it, I'm not responsible for thi

BITSCTF_DFIR Таск 1 - Intro to DFIR Текст таска: DFIR or Digital Forensics and Incident Response is a field within cybersecurity that focuses on the identification, investigation, and remediation of cyberattacks Here are the types of analysis you can expect throughout these sequence of challenges! Решение: В этом таске создатели выда

POC-WINRAR CVE-2023-38831-WinRAR-Exploit Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerability A critical vulnerability has been discovered in versions of the WinRAR software prior to 623, developed by RARLabs This security flaw potentially allows attackers to execute malicious code by manipulating a specially crafted ZIP archive The vulnerab

nto_4fun_2024 REV-1 В таске был encrypt ввода, после чего его версия сравнивалась с заданной Для решения таска необходимо было забрутить его значения Код приложен в файле с названием REV-1 Web-1 burp target download запрос на file1txt

nto2024 CTF Web1 … Web2 Декомпилировали jar файл при помощи jd-gui утилиты linux Поняли, что используется фреймворк Spring Погуглили его уязвимости, нашли на сайте точно такой же обработчик, как в задании и поняли, что ид

Writeups for NTO-2024

Решения заданий НТО ИБ 2024 1337Rpwn4 CTF Этап 1: Наступательная кибербезопасность WEB 1 Заходим на таск и видим календарь, один из дней на котором окрашен в типичную HTML-гиперссылку Нажимаем Идёт редирект на: /download?file_ty

web3 - 30 баллов Заходи на сайт, видим поле для ввода Вводим в него данные, нам пишет ввести имя на странице /flag Переходим в данную директорию, но нам выводит ошибку 403 Анализ исходного кода показал, что нам блоки

Our writeups for NTO 2024:D

Task-Based Web Web1 Замечаем, что на сайте присутствует уязвимость Path Traversal Так как в file1txt есть подсказка об /etc/secret, с помощью уязвимости открываем данный файл Exploit: curl 1921681210:5001/download?file_type=//////etc/secret

evil-winrar,cve-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, cve-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework)

eval-winrar evil-winrar,cve-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, csv-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework) 介绍 evil-winrar是winrar csv-2023-38831漏洞利用和社会工程学攻击框架,支持exp生成,邮件发送和下载链接生成 下载 git clone githubcom/youmulijiang/evil-winrargit cd

SideCopy APT Group exploits CVE-2023-38831

SideCopy Exploits CVE-2023-38831 CVE-2023-38831 is a Remote Code Execution (RCE) vulnerability in WinRAR that impacts WinRAR versions prior to 623 Here's how an attacker can exploit it: the malicious archive file contains both a benign file and a folder with the same name as the file Typically, this folder contains malware that will be executed when the victim attempts

Hi there 👋 I'm focused on Malware Detection, Vulnerability analysis and System programing projects: cobaltstrike-beacon-rust CobaltStrike beacon in rust CVE-2023-38831-winrar-exploit CVE-2023-38831 winrar exploit generator github-hosts-ebpf github-hosts power by eBPF pickup Copy files to clipboard from command line rs-shellcode Another shellcode runner

Báo cáo đồ án Môn: tấn công mạng 1 Thông tin về đồ án Xây dựng mô hình và kịch bản tấn công hệ thống mạng sử dụng mô hình C2 Havoc Mô tả các kỹ thuật tấn công theo MITRE ATT@CK Xây dựng được mô hình chu

CVE-2023-38831 Proof-of-concept code

CVE-2023-38831 This is an easy to use tool that creates a CVE-2023-38831 exploit that affects all WinRAR versions prior to 623 Here's more info about the CVE-2023-38831 exploit RARLAB WinRAR before 623 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive The issue occurs because a ZIP archive may include a benign f

Báo cáo đồ án Môn: tấn công mạng 1 Thông tin về đồ án Xây dựng mô hình và kịch bản tấn công hệ thống mạng sử dụng mô hình C2 Havoc Mô tả các kỹ thuật tấn công theo MITRE ATT@CK Xây dựng được mô hình chu

Exploit Development using python for CVE-2023-38831 (POC)

winDED Custom exploit for CVE-2023-38831 using python Introduction: WinRAR is an archiving software that allows users to create file archives and zipped versions of files and folders so that users can easily transport files/ folders or store them at a compressed size I mean, you’ve heard of it, most definitely It embeds checksums to ensure file integrity, allowing for

CVE-2023-38831-EXP _______ ________ ___ ____ ___ _____ _____ ____ ____ ________ / ____/ | / / ____/ |__ \ / __ \__ \|__ / |__ /( __ )( __ )__ &lt; / / / | | / / __/________/ // / / /_/ / /_ &lt;______ /_ &lt;/ __ / __ |/_ &lt;/ / / /___ | |/ / /__/_____/ __// /_/ / __/___/ /_____/__/ / /_/ / /_/ /__/ / / \____/ |___/_____

天问之路

天问之路 虽然没有进入知识星球,但我也很向往这样的记录。在此会记录我自己的“天问之路” 第一周(20231225-20231231) 主要任务:学习Win32编程,Shellcode,Anti-sandbox 先熟悉了一下Win32的API,看了官方文档的桌面向导案例制作一个窗口应用(比c#实现复杂) 弄了一下按钮的实现

UAC-0099 is a threat actor that targets Ukraine since mid-2022

UAC-0099-Targeting_UA UAC-0099 is a threat actor that targets Ukraine since mid-2022 More information in the blog at wwwdeepinstinctcom/blog/threat-actor-uac-0099-continues-to-target-ukraine CVE-2023-38831 exploited during the campaing - POC RARLAB WinRAR before 623 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP ar

Quick exploit builder for CVE-2023-38831, a vulnerability that affects WinRAR versions before 6.23.

CVE-2023-38831-winrar Quick exploit builder for CVE-2023-38831, a vulnerability that affects WinRAR versions before 623 I created this exploit builder mainly to learn python language, so don't expect to find clean and optimized code

CVE-2023-38831 Installation Vagrant 240 vagrant up

CVE-2023-38831 is an RCE in WinRAR (<6.23)

CVE-2023-38831 CVE-2023-38831 is an RCE in WinRAR (&lt;623) Reference by githubcom/z3r0sw0rd/CVE-2023-38831-PoC Read up by Google's TAG at: bloggoogle/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ Download the latest vulnerable version: 622 for Windows x64 at: wwwwin-rarcom/fileadmin/winrar-versions/winrar

WinRAR-6.22、CVE-2023-38831、CNNVD-202308-1943、DM-202307-003730、QVD-2023-19572漏洞复现

winrar漏洞复现教程 WinRAR-622、CVE-2023-38831、CNNVD-202308-1943、DM-202307-003730、QVD-2023-19572漏洞复现 漏洞信息 WinRAR &lt;623 or WinRAR &lt;=622 参考链接: cn-seccom/archives/1980228html xxbecusteducn/2023/0904/c8463a158425/pagehtm 免责声明: 使用风险: 本工具仅供学习和技术研究目的使用

WinRAR-6.22、CVE-2023-38831、CNNVD-202308-1943、DM-202307-003730、QVD-2023-19572漏洞复现

winrar漏洞复现教程 WinRAR-622、CVE-2023-38831、CNNVD-202308-1943、DM-202307-003730、QVD-2023-19572漏洞复现 漏洞信息 WinRAR &lt;623 or WinRAR &lt;=622 参考链接: cn-seccom/archives/1980228html xxbecusteducn/2023/0904/c8463a158425/pagehtm 免责声明: 使用风险: 本工具仅供学习和技术研究目的使用

Báo cáo đồ án Môn: tấn công mạng 1 Thông tin về đồ án Xây dựng mô hình và kịch bản tấn công hệ thống mạng sử dụng mô hình C2 Havoc Mô tả các kỹ thuật tấn công theo MITRE ATT@CK Xây dựng được mô hình chu

WinRAR cve-2023-38831-poc-generator

CVE-2023-38831 Exploit Generator This tool is a Python script that exploits a vulnerability in the RAR file format (CVE-2023-38831) to execute a malicious command when a user opens a bait file The exploit works on WinRAR versions before 623 For Example 622, 621, 620 or above Requirements Python or python3 Usage There are two ways to use this tool: To generate a proof-

Proof-of-concept of CVE-2023-38831

CVE-2023-38831-POC Proof-of-concept of CVE-2023-38831 Note: The "GTA Leak" file isn't real It's just zeros without ones "What should i click? The folder or the file?"

Config files for my GitHub profile.

About Greetings! I'm a current Masters in Information Security student at Carnegie Mellon University with ~4 years of industry experience in securing organizations from the ground up in all aspects of Security I specialize in DevSecOps, Application Security, Secure Coding, and Performing Security Reviews of Systems and Architectures My other areas of expertise include AW

Recent Articles

IT threat evolution in Q3 2023. Non-mobile statistics
Securelist • AMR • 01 Dec 2023

These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q3 2023: Kaspersky solutions blocked 694,400,301 attacks from online resources across the globe. A total of 169,194,807 unique links were recognized as malicious by Web Anti-Virus components. Attempts to run malware for stealing money from online bank accounts were stopped on the com...

Fancy Bear goes phishing in US, European high-value networks
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources GRU-linked crew going after our code warns Microsoft - Outlook not good

Fancy Bear, the Kremlin's cyber-spy crew, has been exploiting two previously patched bugs for large-scale phishing campaigns against high-value targets – like government, defense, and aerospace agencies in the US and Europe – since March, according to Microsoft.  The US and UK governments have linked this state-sponsored gang to Russia's military intelligence agency, the GRU. Its latest phishing expeditions look to exploit CVE-2023-23397, a Microsoft Outlook elevation of privilege ...

Crims found and exploited these two Microsoft bugs before Redmond fixed 'em
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources SAP, Adobe, Intel, AMD also issue fixes as well as Google for Android

Patch Tuesday Microsoft fixed 73 security holes in this February's Patch Tuesday, and you better get moving because two of the vulnerabilities are under active attack. Of the whole bundle five are rated critical and two others, rated important and moderate threats, are the pair being exploited in the wild. First up: CVE-2024-21412, an internet shortcut file security feature bypass vulnerability that earned an 8.1-out-of-10 CVSS severity rating though Redmond only considers it important. After a ...