Skype for Business RCE via malicious content
CVE-2023-36786 Published on October 10, 2023
Skype for Business Remote Code Execution Vulnerability
Skype for Business Remote Code Execution Vulnerability
Weakness Type
Absolute Path Traversal
The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory. This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Products Associated with CVE-2023-36786
stack.watch emails you whenever new vulnerabilities are published in Microsoft Skype For Business Server or Microsoft Skype For Business. Just hit a watch button to start following.
Affected Versions
Microsoft Skype for Business Server 2015 CU13:- Version 9319.0 and below 6.0.9319.869 is affected.
- Version 2046.0 and below 7.0.246.530 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.