5.4
CVE-2024-38217
- EPSS 11.7%
- Published 10.09.2024 17:15:24
- Last modified 27.01.2025 21:38:34
- Source secure@microsoft.com
- Teams watchlist Login
- Open Login
Windows Mark of the Web Security Feature Bypass Vulnerability
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 HwPlatformx64 Version < 10.0.10240.20766
Microsoft ≫ Windows 10 1507 HwPlatformx86 Version < 10.0.10240.20766
Microsoft ≫ Windows 10 1607 HwPlatformx64 Version < 10.0.14393.7336
Microsoft ≫ Windows 10 1607 HwPlatformx86 Version < 10.0.14393.7336
Microsoft ≫ Windows 10 1809 HwPlatformx64 Version < 10.0.17763.6293
Microsoft ≫ Windows 10 1809 HwPlatformx86 Version < 10.0.17763.6293
Microsoft ≫ Windows 10 21h2 Version < 10.0.19044.4894
Microsoft ≫ Windows 10 22h2 Version < 10.0.19045.4894
Microsoft ≫ Windows 11 21h2 Version < 10.0.22000.3197
Microsoft ≫ Windows 11 22h2 Version < 10.0.22621.4169
Microsoft ≫ Windows 11 23h2 Version < 10.0.22631.4169
Microsoft ≫ Windows 11 24h2 HwPlatformarm64 Version < 10.0.26100.1742
Microsoft ≫ Windows 11 24h2 HwPlatformx64 Version < 10.0.26100.1742
Microsoft ≫ Windows Server 2008 Version- Updatesp2
Microsoft ≫ Windows Server 2008 Versionr2 Updatesp1 HwPlatformx64
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.7336
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.6293
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.2700
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.1128
10.09.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog
Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability
VulnerabilityMicrosoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.
DescriptionApply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Required actionsType | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 11.7% | 0.935 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secure@microsoft.com | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
|
CWE-693 Protection Mechanism Failure
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.