
They're management accounts, not user accounts. User Accounts that have any privileges in the Active Directory domain do not have a mailbox by policy. This script mentions a way to run it without a mailbox using Mailbox Ids, but I couldn't find any documentation. One issue is None of the Domain Admins in our Active Directory have a mailbox. I had to use the -EWSExchange2013 parameter. Granted, this was on an Exchange 2013 instance.

If you're on 2019 or later, the patches are provided through the click-and-run update CDN.įor 2016 and older, patches are provided through windows update and are available from the CVE page. This will prevent the sending of NTLM authentication messages to remote file shares. NOTE: this may cause impact to applications that require NTLM.īlock TCP 445/SMB outbound form your network by using a Firewall and via your VPN settings. This prevents the use of NTLM as an authentication mechanism. This should be patched in the latest release but if needed, the following workarounds are available:Īdd users to the Protected Users Security Group. The connection to the remote SMB-server sends the user's NTLM negotiation message, which will leak the NTLM hash of the victim to the attacker who can then relay this for authentication against other systems as the victim.

The exploitation can be triggered as soon as the client receives the email. With CVE-2023-23397, the attacker sends a message with an extended MAPI-property with a UNC-path to a SMB-share on the attacker-controlled server.
