Head Nerds
Gestion des mises à jour
Sécurité

Outlook Zero-Day (CVE-2023-23397) Fix for N‑central and N‑sight

As you likely be all too aware, there is a Microsoft Outlook zero-day vulnerability listed under CVE-2023-23397. 

With the increased attacks on Outlook this month, Microsoft has pushed out fixes for about 80 Windows flaws. More information on some of those patches can be found in my colleague Lewis Pope’s March 2023 Patch Tuesday blog.

Lewis was also kind enough to send over the remediation script for both N‑able N‑central and N‑able N‑sight. This automation will force an update of Microsoft Office using OfficeC2RClient.exe and can also be used as a custom service that can check the expected build version.

You can download the scripts here:

Now that we have a way to deal with that Microsoft Outlook vulnerability, let’s talk about some patch monitoring best practices in N‑central.  

© N‑able Solutions ULC and N‑able Technologies Ltd. All rights reserved.

This document is provided for informational purposes only and should not be relied upon as legal advice. N‑able makes no warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information contained herein.

The N-ABLE, N-CENTRAL, and other N‑able trademarks and logos are the exclusive property of N‑able Solutions ULC and N‑able Technologies Ltd. and may be common law marks, are registered, or are pending registration with the U.S. Patent and Trademark Office and with other countries. All other trademarks mentioned herein are used for identification purposes only and are trademarks (and may be registered trademarks) of their respective companies.