- Description
- Microsoft Outlook Elevation of Privilege Vulnerability
- Source
- secure@microsoft.com
- NVD status
- Modified
- Products
- 365_apps, office, office_long_term_servicing_channel, outlook
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Microsoft Office Outlook Privilege Escalation Vulnerability
- Exploit added on
- Mar 14, 2023
- Exploit action due
- Apr 4, 2023
- Required action
- Apply updates per vendor instructions.
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
4
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772486007470) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772474108245) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772471053940) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772470150115) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772469370115) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772469075130) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772467509435) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772467449445) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772467269785) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772467029840) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772466970825) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772466610095) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772466489835) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772459771170) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772453652550) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772453470060) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772452751045) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772451098660) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772448792955) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772448682280) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772447769985) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772447652270) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772446090235) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772444901835) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772443991780) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772443090995) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772442970985) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772442431370) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772442070525) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772441182090) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772440810315) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772440569975) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772440390025) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772440269895) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772440089710) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772439369415) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772439129750) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772438709515) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772438658235) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772438600550) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772438469265) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772438289305) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772437869080) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772437391750) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772435590850) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772435410985) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772435350995) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772435290175) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772435230320) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ PenTest tip: explore CVE-2023-23397 – Windows Print Spooler remote code execution vulnerability. Use it as a sandbox exercise to sharpen your exploit‑development skills. #PenTesting #CVE CVE-2023-23397 (ref:1772434870445) 😃 I love digging into real‑world exploits
@audn_ai
2 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*",
"matchCriteriaId": "0B3EF1E5-4757-4CFA-AE72-6BA876D3C9FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:-:*:*:*",
"matchCriteriaId": "8D513A61-6427-4F85-AADF-99D6F223AF2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:rt:*:*:*",
"matchCriteriaId": "DDA98A76-D0D1-4BFA-BEAC-1C2313F7B859",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B1657C-0FF4-461A-BE2A-641275C4B0A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]