Outlook Zero-Day (CVE-2023-23397) Fix for N‑central and N‑sight

As you likely be all too aware, there is a Microsoft Outlook zero-day vulnerability listed under CVE-2023-23397.
With the increased attacks on Outlook this month, Microsoft has pushed out fixes for about 80 Windows flaws. More information on some of those patches can be found in my colleague Lewis Pope’s March 2023 Patch Tuesday blog.
Lewis was also kind enough to send over the remediation script for both N‑able N‑central and N‑able N‑sight. This automation will force an update of Microsoft Office using OfficeC2RClient.exe and can also be used as a custom service that can check the expected build version.
You can download the scripts here:
- CVE-2023-23397 Remediation Script for N‑able N‑central
- CVE-2023-23397 Remediation Script for N‑able N‑sight
Now that we have a way to deal with that Microsoft Outlook vulnerability, let’s talk about some patch monitoring best practices in N‑central.
© N‑able Solutions ULC y N‑able Technologies Ltd. Todos los derechos reservados.
Este documento solo se proporciona con fines informativos. No debe utilizarse para obtener orientación legal. N‑able no ofrece ninguna garantía, implícita o explícita, ni asume ninguna responsabilidad legal o jurídica por la exactitud, integridad o utilidad de cualquier información contenida en este documento.
N-ABLE, N-CENTRAL y otras marcas comerciales y logotipos de N‑able son propiedad exclusiva de N‑able Solutions ULC y N‑able Technologies Ltd., y pueden ser marcas sujetas al derecho anglosajón, estar registradas o pendientes de registro en la Oficina de Patentes y Marcas de Estados Unidos o en otros países. El resto de marcas comerciales mencionadas en este documento solo se utilizan con fines de identificación y son marcas comerciales (o marcas comerciales registradas) de sus respectivas empresas.