Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2018-8160: Microsoft Outlook Information Disclosure Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft CVE-2018-8160: Microsoft Outlook Information Disclosure Vulnerability

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
05/08/2018
Created
07/25/2018
Added
05/08/2018
Modified
06/03/2019

Description

An information disclosure vulnerability exists in Outlook when a message is opened. This vulnerability could potentially result in the disclosure of sensitive information to a malicious site. To exploit the vulnerability, an attacker would have to send a malicious email to a user and convince the user to open the email. A connection to a remote SMB server could then be automatically initiated, enabling the attacker to brute-force attack the corresponding NTLM challenge and response in order to disclose the corresponding hash password. Depending on the URL contained in the malicious email, Outlook could fall back to initating a web request to a remote server, disclosing the the external IP of the user's system. The security update addresses the vulnerability by correcting how Outlook processes embedded URLs.

Solution(s)

  • msft-kb4018308-c9f90e7b-5e69-49cc-b487-6c84f1f0be40
  • msft-kb4022135-d9da46bb-5c7f-411a-bae3-3225143aada4
  • msft-kb4022137-9d64be86-d3f2-47a4-a9a3-f8ae05842ed3
  • msft-kb4022137-ea7f13cd-f59c-44f3-a35c-261ec9627f11
  • msft-kb4022142-5454753e-f2fe-4610-8f79-85b5693466be
  • msft-kb4022142-d19ffe86-ae68-4d2d-baf2-3588a2334ceb

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;