CVE-2023-23397

Published Mar 14, 2023

Last updated 4 months ago

Overview

Description
Microsoft Outlook Elevation of Privilege Vulnerability
Source
secure@microsoft.com
NVD status
Modified
Products
365_apps, office, office_long_term_servicing_channel, outlook

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Microsoft Office Outlook Privilege Escalation Vulnerability
Exploit added on
Mar 14, 2023
Exploit action due
Apr 4, 2023
Required action
Apply updates per vendor instructions.

Weaknesses

secure@microsoft.com
CWE-20
nvd@nist.gov
CWE-294

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

4

  1. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772486007470) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772474108245) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772471053940) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772470150115) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772469370115) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772469075130) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772467509435) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772467449445) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772467269785) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772467029840) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772466970825) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772466610095) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772466489835) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772459771170) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  15. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772453652550) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  16. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772453470060) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772452751045) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  18. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772451098660) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  19. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772448792955) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  20. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772448682280) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  21. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772447769985) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  22. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772447652270) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  23. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772446090235) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772444901835) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772443991780) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772443090995) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772442970985) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772442431370) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772442070525) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772441182090) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  31. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772440810315) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772440569975) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772440390025) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772440269895) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772440089710) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  36. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772439369415) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772439129750) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772438709515) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  39. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772438658235) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772438600550) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772438469265) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772438289305) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772437869080) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  44. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772437391750) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  45. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772435590850) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  46. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772435410985) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772435350995) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  48. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772435290175) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  49. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772435230320) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. 🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772434870445) 😃 I love digging into real‑world exploits

    @audn_ai

    2 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations