DCS Leads Forensics

Outlook Vulnerability CVE-2023-23397

By Adam Findlay|24th March 2023

Attention users of Microsoft Outlook! A recent vulnerability has been identified and it’s important that you take action to protect your system.

CVE-2023-23397 affects all supported versions of Microsoft Outlook running on Windows and allows a hacker to obtain a user’s credentials by sending a contaminated email to the user.

Microsoft has already released a patch to fix this vulnerability. All users of MS Outlook should check for and install any outstanding updates as possible to ensure that they are protected against this threat. In order to do this on up-to-date versions of Microsoft Outlook please follow the steps below.

  • Open Microsoft Outlook
  • Click on “File” in the top-left corner of the screen
  • Select “Office Account” from the left-hand menu
  • Click on “Update Options”
  • Select “Update Now”
  • Microsoft will then check for any available updates and install them automatically.

This is a good reminder of the importance of keeping your software up to date. Cybersecurity threats are constantly evolving and updating your software is one of the best ways to stay protected against them. Software updates often include security patches and bug fixes that help to protect your system from known vulnerabilities.

In addition to installing software updates, it’s also important to implement strong authentication measures. Multi-factor authentication (MFA) is a great way to add an extra layer of protection to your accounts. With MFA, users are required to provide two or more forms of authentication before they can access their accounts. This helps to prevent unauthorized access and reduces the risk of data breaches.

At DCS our team is here to help you ensure that your systems are up-to-date and secure. We strongly encourage all our customers to install outstanding updates and to implement MFA wherever possible.

If you have any questions or concerns about this new vulnerability or your cybersecurity in general, please don’t hesitate to contact us.