Query Details
//Defending against CVE-2024-21413 Outlook MonikerLink Bug Abuse //https://www.linkedin.com/pulse/defending-against-cve-2024-21413-outlook-monikerlink-bug-steven-lim-wesac/ let VulnerableEndpoints = DeviceTvmSoftwareVulnerabilities | where CveId == "CVE-2024-21413" | project DeviceId; DeviceProcessEvents | where FileName=="OUTLOOK.EXE" | join DeviceNetworkEvents on DeviceId | where DeviceId has_any(VulnerableEndpoints) | where RemotePort == 445 | where RemoteIPType=="Public" | where ActionType1=="ConnectionSuccess" | project Timestamp, DeviceName, AccountUpn, ActionType1, RemoteIP
This KQL (Kusto Query Language) query is designed to identify and defend against the CVE-2024-21413 vulnerability, specifically related to the Outlook MonikerLink bug. Here's a simplified summary of what the query does:
Identify Vulnerable Devices:
DeviceTvmSoftwareVulnerabilities table.DeviceId of these vulnerable devices.Monitor Outlook Activity:
DeviceProcessEvents table for processes where the FileName is "OUTLOOK.EXE".DeviceNetworkEvents table using the DeviceId.Filter for Specific Network Activity:
RemotePort is 445 (commonly used for SMB/CIFS network file sharing).RemoteIPType is "Public" (indicating the connection is to a public IP address).ActionType1 is "ConnectionSuccess" (indicating a successful connection).Output Relevant Information:
Timestamp, DeviceName, AccountUpn (user account), ActionType1, and RemoteIP.In essence, this query helps to identify instances where vulnerable devices running Outlook have successfully connected to a public IP on port 445, which could indicate potential exploitation of the CVE-2024-21413 vulnerability.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators