6.5

CVE-2024-38213

Warning

Windows Mark of the Web Security Feature Bypass Vulnerability

Data is provided by the National Vulnerability Database (NVD)
MicrosoftWindows 10 1507 Version < 10.0.10240.20680
MicrosoftWindows 10 1607 Version < 10.0.14393.7070
MicrosoftWindows 10 1809 Version < 10.0.17763.5936
MicrosoftWindows 10 21h2 Version < 10.0.19044.4529
MicrosoftWindows 10 22h2 Version < 10.0.19045.4529
MicrosoftWindows 11 21h2 Version < 10.0.22000.3019
MicrosoftWindows 11 22h2 Version < 10.0.22621.3737
MicrosoftWindows 11 23h2 Version < 10.0.22631.3737
MicrosoftWindows Server 2012 Version < 6.2.9200.24919
MicrosoftWindows Server 2016 Version < 10.0.14393.7070
MicrosoftWindows Server 2019 Version < 10.0.17763.5936
MicrosoftWindows Server 2022 Version < 10.0.20348.2522
MicrosoftWindows Server 2022 23h2 Version < 10.0.25398.950

13.08.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft Windows SmartScreen Security Feature Bypass Vulnerability

Vulnerability

Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience via a malicious file.

Description

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 75.07% 0.988
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secure@microsoft.com 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CWE-693 Protection Mechanism Failure

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.