{"id":43704,"date":"2023-03-15T11:09:47","date_gmt":"2023-03-15T11:09:47","guid":{"rendered":"https:\/\/www.n-able.com\/?p=43704"},"modified":"2023-03-21T14:04:05","modified_gmt":"2023-03-21T14:04:05","slug":"patch-tuesday-march-2023","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023","title":{"rendered":"Patch Tuesday March 2023: Outlook Zero-Day and Challenges for Legacy Apps Due to DCOM Hardening \u00a0\u00a0"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">Microsoft has addressed 83 flaws this Patch Tuesday, two of which are actively exploited zero-day vulnerabilities involving Microsoft Outlook and Mark of the Web (MOTW) evasion. However, there may be larger headaches looming for system admins and helpdesks due to the new DCOM hardening measures that were finalized as part of this Microsoft Patch Tuesday. <\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Microsoft Vulnerabilities <\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">Of the 83 vulnerabilities addressed this month by Microsoft, nine are Critical and there are two zero-days under active exploitation. The zero-day vulnerabilities for this month are both notable and require the immediate attention of MSPs and sysadmins. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23397\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-23397<\/span><\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-24880\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-24880<\/span><\/a> are going to affect a large number of environments as they involve Microsoft Outlook and Windows SmartScreen, which are almost ubiquitous in modern businesses. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">CVE-2023-24880 allows an attacker to evade the MOTW defense, allowing evasion of Windows SmartScreen and potentially leading to the execution of malicious payloads. While it is under active exploitation it\u2019s lower CVSS of 5.4 and the use of a good <a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">endpoint protection solution<\/span><\/a> should keep this from causing widespread havoc. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Meanwhile, CVE-2023-23397 is a Microsoft Outlook elevation of privilege vulnerability carrying a CVSS score of 9.8. It allows an attacker to use \u201cspecially crafted emails that will cause a connection from the victim to an external UNC location of attackers\u2019 control. This will leak the Net-NTLMv2 hash of the victim to the attacker who can then relay this to another service and authenticate as the victim\u201d. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">This means an attacker can record the valid credentials of a user simply by sending an email that is downloaded by Outlook, regardless of whether the user views the email or not, forcing Outlook to authenticate to an SMB share controlled by the attacker. Results of this attack can range from lateral movement within an environment, to anything else that a valid set of credentials could allow an attacker to do. The more privileged the user targeted, the greater the potential damage that can be done. <\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">CVE-2023-23397 Hunting, Remediation and Mitigations<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">Microsoft has also provided additional information on remediation, mitigations, and hunting for any Exchange users that may have been targeted by this attack. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23397\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Microsoft is advising additional mitigations<\/span><\/a> be applied along with standard security updates. These include adding users to the Protected Users Security Group (which might have an impact on any applications using NTLM authentication), and blocking TCP 445 outbound on endpoint and perimeter firewalls along with blocking on VPNs. <\/span><\/p>\n<p class=\"p4\"><span class=\"s3\"><a href=\"https:\/\/microsoft.github.io\/CSS-Exchange\/Security\/CVE-2023-23397\/\" target=\"_blank\" rel=\"noopener\">Microsoft has also provided a PowerShell script<\/a><\/span><span class=\"s1\"> that can be run against an Exchange Server to discover any email, calendar, or task item that has a property populated with a UNC path. This can indicate potentially targeted accounts and it would be a good idea to investigate activity associated with those accounts, rotate the password, and enable MFA if not already enabled. <\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">DCOM Hardening<\/span><\/h2>\n<p class=\"p4\"><span class=\"s3\"><a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/DCOM-Distributed-Component-Object-Model\" target=\"_blank\" rel=\"noopener\">Distributed Component Object Model<\/a><\/span><span class=\"s1\"> (DCOM) has been a core component of how many applications (including line of business software) operate over networks for well over 20 years. This means that legacy software may be impacted by <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5004442<\/span><\/a> now forcing DCOM servers to use more robust authentication with no option to revert to less secure options. This is another great example of how the need for more resilient and secure operations forces improvements that some businesses may see as an unnecessary headache or expense. The reality is they are really just the cost of doing business in a modern, ever-connected global economy.<\/span><\/p>\n<h2 class=\"p1\">Microsoft Patch Tuesday <span class=\"s1\">Vulnerability Prioritization <\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">As always, prioritizing which vulnerabilities to address first is part following established best practices and a little bit of gut instinct. Critical severity, exploitation more likely and exploitation detected vulnerabilities as always should be ranking fairly high on priority list. If you only patch based on severity you are leaving a lot of unnecessary risk exposure lying around. <\/span><\/p>\n<p class=\"p5\"><em><span class=\"s4\"><b>Table Key:\u00a0<\/b>Severity:\u00a0C = Critical, I = Important, M = Moderate;\u00a0Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected\u00a0<\/span><\/em><\/p>\n<p class=\"p4\"><span class=\"s1\">\u00a0<\/span><\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\" width=\"20%\">\n<p class=\"p6\"><strong><span class=\"s1\">CVE <\/span><\/strong><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\" width=\"60%\">\n<p class=\"p6\"><strong><span class=\"s1\">Description<\/span><\/strong><\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\" width=\"10%\">\n<p class=\"p6\" style=\"text-align: center\"><strong><span class=\"s1\">Severity<\/span><\/strong><\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\" width=\"10%\">\n<p class=\"p6\" style=\"text-align: center\"><strong><span class=\"s1\">Status<\/span><\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23397\" target=\"_blank\" rel=\"noopener\">CVE-2023-23397<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">Microsoft Outlook Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23411\" target=\"_blank\" rel=\"noopener\">CVE-2023-23411<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">Windows Hyper-V Denial of Service Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23404\" target=\"_blank\" rel=\"noopener\">CVE-2023-23404<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21708\" target=\"_blank\" rel=\"noopener\">CVE-2023-21708<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1018\" target=\"_blank\" rel=\"noopener\">CVE-2023-1018<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">CERT\/CC: CVE-2023-1018 TPM2.0 Module Library Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1017\" target=\"_blank\" rel=\"noopener\">CVE-2023-1017<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">CERT\/CC: CVE-2023-1017 TPM2.0 Module Library Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-41127\" target=\"_blank\" rel=\"noopener\">CVE-2022-41127<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">Microsoft Dynamics NAV and Microsoft Dynamics 365 Business Central (On Premises) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23416\" target=\"_blank\" rel=\"noopener\">CVE-2023-23416<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">Windows Cryptographic Services Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23415\" target=\"_blank\" rel=\"noopener\">CVE-2023-23415<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23392\" target=\"_blank\" rel=\"noopener\">CVE-2023-23392<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">HTTP Protocol Stack Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24861\" target=\"_blank\" rel=\"noopener\">CVE-2023-24861<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">Windows Graphics Component Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23410\" target=\"_blank\" rel=\"noopener\">CVE-2023-23410<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">Windows HTTP.sys Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23398\" target=\"_blank\" rel=\"noopener\">CVE-2023-23398<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">Microsoft Excel Spoofing Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24880\" target=\"_blank\" rel=\"noopener\">CVE-2023-24880<\/a><\/span><\/p>\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p8\"><span class=\"s1\">Windows SmartScreen Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td7\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">M<\/span><\/p>\n<\/td>\n<td class=\"td8\" valign=\"top\">\n<p class=\"p6\" style=\"text-align: center\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p4\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">As always make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected and Exploitation More Likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Patch Management<\/span><\/a> routines. <\/span><\/p>\n<p class=\"p9\"><span class=\"s1\"><b>Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Reviews, then check out <\/b><a href=\"https:\/\/www.n-able.com\/blog\/patch-management?filter_products=all#filtered\" target=\"_blank\" rel=\"noopener\"><span class=\"s6\"><b>this section of our blog<\/b><\/span><\/a><b>.<\/b>\u00a0<\/span><\/p>\n<p class=\"p9\"><span class=\"s1\">Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s6\">@cybersec_nerd<\/span><\/a><\/span><\/p>\n<p class=\"p10\"><span class=\"s7\">LinkedIn:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s8\">thesecuritypope<\/span><\/a><\/span><\/p>\n<p class=\"p10\"><span class=\"s7\">Twitch:\u00a0<a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s8\">cybersec_nerd<\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Outlook, Mark of the Web, and the enforced hardening of DCOM are the headlines for March&rsquo;s Patch Tuesday. Lewis Pope looks at the finer details.<\/p>\n","protected":false},"author":63,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-43704","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday March 2023: Outlook Zero-Day and Challenges for Legacy Apps Due to DCOM Hardening \u00a0\u00a0 - N-able<\/title>\n<meta name=\"description\" content=\"Microsoft Outlook, Mark of the Web, and the enforced hardening of DCOM are the headlines for March&#039;s Patch Tuesday. Read this blog for more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday March 2023: Outlook Zero-Day and Challenges for Legacy Apps Due to DCOM Hardening \u00a0\u00a0 - N-able\" \/>\n<meta property=\"og:description\" content=\"Microsoft Outlook, Mark of the Web, and the enforced hardening of DCOM are the headlines for March&#039;s Patch Tuesday. Read this blog for more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-15T11:09:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T14:04:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pete Roythorne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pete Roythorne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023\"},\"author\":{\"name\":\"Pete Roythorne\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/d6ca231a620b3d6123d2775901a88837\"},\"headline\":\"Patch Tuesday March 2023: Outlook Zero-Day and Challenges for Legacy Apps Due to DCOM Hardening \u00a0\u00a0\",\"datePublished\":\"2023-03-15T11:09:47+00:00\",\"dateModified\":\"2023-03-21T14:04:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023\"},\"wordCount\":929,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023\",\"name\":\"Patch Tuesday March 2023: Outlook Zero-Day and Challenges for Legacy Apps Due to DCOM Hardening \u00a0\u00a0 - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2023-03-15T11:09:47+00:00\",\"dateModified\":\"2023-03-21T14:04:05+00:00\",\"description\":\"Microsoft Outlook, Mark of the Web, and the enforced hardening of DCOM are the headlines for March's Patch Tuesday. Read this blog for more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/head-nerds-fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday March 2023: Outlook Zero-Day and Challenges for Legacy Apps Due to DCOM Hardening \u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/d6ca231a620b3d6123d2775901a88837\",\"name\":\"Pete Roythorne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"caption\":\"Pete Roythorne\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday March 2023: Outlook Zero-Day and Challenges for Legacy Apps Due to DCOM Hardening \u00a0\u00a0 - N-able","description":"Microsoft Outlook, Mark of the Web, and the enforced hardening of DCOM are the headlines for March's Patch Tuesday. Read this blog for more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023","og_locale":"fr_FR","og_type":"article","og_title":"Patch Tuesday March 2023: Outlook Zero-Day and Challenges for Legacy Apps Due to DCOM Hardening \u00a0\u00a0 - N-able","og_description":"Microsoft Outlook, Mark of the Web, and the enforced hardening of DCOM are the headlines for March's Patch Tuesday. Read this blog for more.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2023-03-15T11:09:47+00:00","article_modified_time":"2023-03-21T14:04:05+00:00","og_image":[{"width":2500,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png","type":"image\/png"}],"author":"Pete Roythorne","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Pete Roythorne","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023"},"author":{"name":"Pete Roythorne","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/d6ca231a620b3d6123d2775901a88837"},"headline":"Patch Tuesday March 2023: Outlook Zero-Day and Challenges for Legacy Apps Due to DCOM Hardening \u00a0\u00a0","datePublished":"2023-03-15T11:09:47+00:00","dateModified":"2023-03-21T14:04:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023"},"wordCount":929,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Head Nerds","Patch Management"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023","url":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023","name":"Patch Tuesday March 2023: Outlook Zero-Day and Challenges for Legacy Apps Due to DCOM Hardening \u00a0\u00a0 - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2023-03-15T11:09:47+00:00","dateModified":"2023-03-21T14:04:05+00:00","description":"Microsoft Outlook, Mark of the Web, and the enforced hardening of DCOM are the headlines for March's Patch Tuesday. Read this blog for more.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-march-2023#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/head-nerds-fr"},{"@type":"ListItem","position":2,"name":"Patch Tuesday March 2023: Outlook Zero-Day and Challenges for Legacy Apps Due to DCOM Hardening \u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/d6ca231a620b3d6123d2775901a88837","name":"Pete Roythorne","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","caption":"Pete Roythorne"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/43704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=43704"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/43704\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=43704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}