CVE-2023-3531111.07.2023, 18:15Microsoft Outlook Security Feature Bypass VulnerabilityTOCTOUEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST8.8 HIGHNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HmicrosoftCNA8.8 HIGHCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:CCVEADP------CISA-ADPADP7.5 HIGHNETWORKHIGHNONECVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HBase ScoreCVSS 3.xEPSS ScorePercentile: 78%VendorProductVersionmicrosoft365_apps-microsoft365_apps𝑥< 2306microsoftoffice𝑥< 2306𝑥= Vulnerable software versionsCommon Weakness EnumerationCWE-367 - Time-of-check Time-of-use (TOCTOU) Race ConditionThe software checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the software to perform invalid actions when the resource is in an unexpected state.Referenceshttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311