6.5

CVE-2024-38213

Warnung

Windows Mark of the Web Security Feature Bypass Vulnerability

Windows Mark of the Web Security Feature Bypass Vulnerability
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MicrosoftWindows 10 1507 Version < 10.0.10240.20680
MicrosoftWindows 10 1607 Version < 10.0.14393.7070
MicrosoftWindows 10 1809 Version < 10.0.17763.5936
MicrosoftWindows 10 21h2 Version < 10.0.19044.4529
MicrosoftWindows 10 22h2 Version < 10.0.19045.4529
MicrosoftWindows 11 21h2 Version < 10.0.22000.3019
MicrosoftWindows 11 22h2 Version < 10.0.22621.3737
MicrosoftWindows 11 23h2 Version < 10.0.22631.3737
MicrosoftWindows Server 2012 Version < 6.2.9200.24919
MicrosoftWindows Server 2016 Version < 10.0.14393.7070
MicrosoftWindows Server 2019 Version < 10.0.17763.5936
MicrosoftWindows Server 2022 Version < 10.0.20348.2522
MicrosoftWindows Server 2022 23h2 Version < 10.0.25398.950

13.08.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft Windows SmartScreen Security Feature Bypass Vulnerability

Schwachstelle

Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience via a malicious file.

Beschreibung

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 59.32% 0.981
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
secure@microsoft.com 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CWE-693 Protection Mechanism Failure

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.