CVE-2023-29324 is a new vulnerability in the Windows MSHTML platform.
CVE-2023-29324 Technical Overview: What Is Known So Far
First of, let’s explain what the MSHTML platform is. MSHTML, commonly referred to as Trident, is the browser engine used by Microsoft’s Internet Explorer web browser. It was first introduced with the release of Internet Explorer 4 in 1997.
Ben Barnea, an Akamai security researcher, identified and reported a security feature bypass vulnerability known as CVE-2023-29324, with a CVSS score of 6.5, in the Windows MSHTML platform. This vulnerability could be used to bypass integrity protections on targeted machines and affected all Windows versions.
Fortunately, Microsoft addressed the issue with their Patch Tuesday updates for May 2023. However, Exchange servers with the March update have removed the vulnerable feature and are not affected.
This vulnerability in Windows allows the MapUrlToZone API function to incorrectly assume that a remote path is a local one. This API is often used as a security measure, specifically in the Outlook CVE-2023-23397 vulnerability that was patched on March’s Patch Tuesday.
An unauthenticated attacker on the internet can exploit this vulnerability to make an Outlook client connect to an attacker-controlled server, putting the client’s NTLM credentials at risk.
This zero-click vulnerability can be triggered without any user input, and affects all versions of Windows and Outlook clients, though Microsoft has stated that Exchange servers with the March update have removed the vulnerable feature to protect vulnerable clients from being exploited.
Microsoft strongly suggests installing Internet Explorer Cumulative updates to address any potential weaknesses in the MSHTML platform and scripting engine.