8.8

CVE-2024-29988

Warning

SmartScreen Prompt Security Feature Bypass Vulnerability

Data is provided by the National Vulnerability Database (NVD)
MicrosoftWindows 10 1809 HwPlatformarm64 Version < 10.0.17763.5696
MicrosoftWindows 10 1809 HwPlatformx64 Version < 10.0.17763.5696
MicrosoftWindows 10 1809 HwPlatformx86 Version < 10.0.17763.5696
MicrosoftWindows 10 21h2 Version < 10.0.19044.4291
MicrosoftWindows 10 22h2 Version < 10.0.19045.4291
MicrosoftWindows 11 21h2 Version < 10.0.22000.2899
MicrosoftWindows 11 22h2 Version < 10.0.22621.3447
MicrosoftWindows 11 23h2 Version < 10.0.22631.3447
MicrosoftWindows Server 2019 Version < 10.0.17763.5696
MicrosoftWindows Server 2022 Version < 10.0.20348.2402
MicrosoftWindows Server 2022 23h2 Version < 10.0.25398.830

30.04.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability

Vulnerability

Microsoft SmartScreen Prompt contains a security feature bypass vulnerability that allows an attacker to bypass the Mark of the Web (MotW) feature. This vulnerability can be chained with CVE-2023-38831 and CVE-2024-21412 to execute a malicious file.

Description

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 64.77% 0.984
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secure@microsoft.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-693 Protection Mechanism Failure

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.