Windows OLE Remote Code Execution Vulnerability (CVE-2023-29325)
Description
What is Windows OLE? |
OLE (Object Linking and Embedding) is a feature in Microsoft Windows that enables software to work together and share data. The feature, for example, allows a table created using Microsoft Excel either be embedded or linked to Microsoft PowerPoint.
|
What is the Attack? | CVE-2023-29325 is a remote code execution vulnerability in Microsoft Outlook and is stemmed from a buffer error when loading OleCache object. Successful exploitation could result in remote code execution under the context of the vulnerable application. CVE-2023-29325 has a CVSS base score of 8.1 and is rated critical by Microsoft.
|
Why is this Significant? |
This is significant because, while exploitation of CVE-2023-29325 has not been reported or observed - the vulnerability has been publicly disclosed and Proof-of-Concept (PoC) code is available. The Microsoft advisory states that exploitation is more likely. As such, the patch should be applied as soon as possible. |
What is the Vendor Solution?
|
Microsoft released a fix as part of regular Microsoft Patch Tuesday on May 9th, 2023. |
What FortiGuard Coverage is Available? | FortiGuard Labs has the following IPS signature in place that will prevent exploitation of CVE-2023-29325:
|
Is Mitigation Available?
| The Microsoft advisory provides mitigation methods. Please refer to the Appendix for a link to "Windows OLE Remote Code Execution Vulnerability (CVE-2023-29325)". |
Appendix
Windows OLE Remote Code Execution Vulnerability (CVE-2023-29325) (Microsoft)
CVE-2023-29325 (MITRE)
MS.Outlook.OleCache.CVE-2023-29325.Remote.Code.Execution (Fortinet)
✖