Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36763: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Microsoft Office 2019

0
High
VulnerabilityCVE-2023-36763cvecve-2023-36763cwe-200
Published: Tue Sep 12 2023 (09/12/2023, 16:58:44 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Office 2019

Description

Microsoft Outlook Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 10/30/2025, 19:12:24 UTC

Technical Analysis

CVE-2023-36763 is an information disclosure vulnerability classified under CWE-200 affecting Microsoft Outlook 2019, a component of Microsoft Office 2019. The vulnerability allows an unauthenticated attacker to remotely access sensitive information without requiring any user interaction, which significantly increases the risk profile. The CVSS 3.1 base score is 7.5, reflecting high severity due to the confidentiality impact (high), with no impact on integrity or availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component. Although no known exploits are currently reported in the wild, the vulnerability's characteristics suggest it could be leveraged to extract sensitive data from targeted Outlook 2019 installations remotely. The lack of a patch link indicates that remediation may still be pending or in progress. This vulnerability poses a significant risk to organizations relying on Outlook 2019 for email communications, as sensitive information could be exposed to unauthorized actors, potentially leading to data breaches or further targeted attacks.

Potential Impact

For European organizations, the exposure of sensitive information through Outlook 2019 could lead to significant confidentiality breaches, including leakage of personal data, intellectual property, or confidential communications. This could result in regulatory penalties under GDPR due to unauthorized data exposure. The vulnerability's remote and unauthenticated nature means attackers can exploit it without insider access or user interaction, increasing the risk of widespread attacks. Organizations in sectors such as finance, government, healthcare, and critical infrastructure are particularly at risk due to the sensitive nature of their communications. The absence of integrity or availability impact limits the threat to data leakage rather than system disruption, but the reputational and compliance consequences could be severe. Additionally, attackers could use the disclosed information as a foothold for further exploitation or social engineering attacks.

Mitigation Recommendations

Organizations should prioritize monitoring Microsoft’s security advisories for the release of patches addressing CVE-2023-36763 and apply them immediately upon availability. In the interim, network-level mitigations should be implemented, such as restricting inbound and outbound traffic to Outlook services to trusted IP ranges and deploying intrusion detection systems to identify anomalous access patterns. Employing email security gateways that can detect and block suspicious traffic may reduce exposure. Administrators should audit and limit the exposure of Outlook 2019 instances to the internet, favoring VPN or secure internal access methods. Additionally, organizations should conduct regular security awareness training to help users recognize potential phishing or social engineering attempts that could leverage leaked information. Logging and monitoring of Outlook access logs should be enhanced to detect unusual data retrieval activities. Finally, organizations should evaluate the feasibility of upgrading to supported versions of Microsoft Office with active security support.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2023-06-27T15:11:59.868Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6903adc5aebfcd54748fc7ae

Added to database: 10/30/2025, 6:26:13 PM

Last enriched: 10/30/2025, 7:12:24 PM

Last updated: 11/6/2025, 11:39:55 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats