Описание
GitHub: CVE-2024-29187 WiX Burn-based bundles are vulnerable to binary hijack when run as SYSTEM
Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.
FAQ
According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability?
An authorized attacker must send the user a malicious file and convince the user to open it.
Why is this GitHub CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in Wix Toolset software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.
What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
What is the mitigation strategy for Microsoft developer toolkits that are affected by this vulnerability?
Microsoft is committed to ensuring the security and integrity of our products. We are pleased to announce that an update in reference to the WiX vulnerability (CVE-2024-29187), which affect various kits, has been released. This vulnerability, which allows for binary hijacking when the installer is run as SYSTEM, was publicly disclosed on GitHub in March 2024.
Following are the mitigation steps we have taken for each toolkit:
Windows Assessment and Deployment Kit (Windows ADK) and Windows PE add-on
Update: As of May 29, 2025, mitigations are also available for Windows Assessment and Deployment Kit (Windows ADK) and Windows PE add-on.
The WiX vulnerability has been addressed in the following ADK versions:
- ADK and ADK WinPE Add-on version 10.1.26100.2454 and later
- ADK and ADK WinPE Add-on version 10.1.25398.1 (Republished in January 2025)
- ADK and ADK WinPE Add-on for Windows 11, version 22H2 (Republished in May 2025)
- ADK and ADK WinPE Add-on for Windows Server 2022 (Republished in May 2025)
- ADK and ADK WinPE Add-on for Windows 10, version 2004 (Republished in May 2025)
- ADK and ADK WinPE Add-on for Windows 10, version 1809 (Republished in May 2025)
- ADK for Windows 10, version 1607 (Republished in May 2025)
Because older ADK releases are susceptible to the WiX vulnerability, we recommend that customers always use the latest released ADK. If one of the ADK versions (prior to version 10.1.26100.2454) from the preceding list must be used, make sure to install it with the new links provided in (https://learn.microsoft.com/en-us/windows-hardware/get-started/adk-install#other-adk-downloads)[Download and install the Windows ADK - Other ADK downloads]. As a result, other older ADK versions will no longer be distributed.
See the Summary Table at the end of this FAQ for the ADK and ADK WinPE Add-on that is applicable to your system.
Windows Driver Kit (WDK)
The WiX vulnerability has been addressed in WDK version 10.0.26100.1591 and later. The latest WDK supports driver development for Windows 10, Windows Server 2016, and all later client and server versions.
Because older WDK releases are susceptible to the WiX vulnerability and the latest kits include the most secure and updated tools and compilers, we recommend that customers always use the latest released WDK. As a result, older WDK versions will no longer be distributed. See https://learn.microsoft.com/windows-hardware/drivers/download-the-wdk for more information.
Software Development Kit (SDK)
The WiX vulnerability has been addressed in SDK version 10.0.26100.1742 and later. The latest SDK for Windows 11 can be used to build Universal Windows Platform (UWP) and Win32 apps for Windows 11, version 24H2, and earlier Windows releases.
Since older SDK versions are affected by the WiX vulnerability and the latest releases offer the most secure and updated tools, we recommend always using the latest SDK. See the https://developer.microsoft.com/en-us/windows/downloads/windows-sdk/ for more information.
Hardware Lab Kit (HLK)
We have serviced and released older versions of HLK with fixes for the WiX vulnerability. Customers are encouraged to update to either the latest HLK version or a matching serviced version when testing drivers for older operating systems. See https://learn.microsoft.com/windows-hardware/test/hlk/ for more information.
Mitigations for additional kits are in process.
Summary Table
The following table provides a breakdown of Windows version and the recommended kits to use.
| Windows Version | SDK | WDK | HLK | ADK |
|---|---|---|---|---|
| Windows 11 version 24H2, Windows Server 2025 | 24H2_SDK | 24H2_WDK | Windows Hardware Lab Kit - Microsoft Learn | ADK 10.1.26100.2454 (December 2024) or later |
| Windows 11 version 23H2 | Use latest released SDK | Use latest released WDK | Windows Hardware Lab Kit - Microsoft Learn | ADK 10.1.25398.1 (Republished in January 2025) |
| Windows 11 version 22H2 | Use latest released SDK | Use latest released WDK | Windows Hardware Lab Kit - Microsoft Learn | ADK Windows 11, version 22H2 (Republished in May 2025) |
| Windows Server 2022 | Use latest released SDK | Use latest released WDK | Windows HLK for Windows Server 2022 | ADK for Windows Server 2022 (Republished in May 2025) |
| Windows 10 versions 22H2, 21H2, 21H, 20H2 and 2004 | Use latest released SDK | Use latest released WDK | Windows HLK for Windows 10, version 2004 | ADK for Windows 10, version 2004 (Republished in May 2025) |
| Windows version 1903 | Use latest released SDK | Use latest released WDK | Out of support | Out of support |
| Windows 10 version 1809, Windows Server 2019 | Use latest released SDK | Use latest released WDK | Windows Hardware Lab Kit - Microsoft Learn | ADK for Windows 10, version 1809 (Republished in May 2025) |
| Windows 10 version 1803 | Use latest released SDK | Use latest released WDK | Out of support | Out of support |
| Windows 10 version 1709 | Use latest released SDK | Use latest released WDK | Out of support | Out of support |
| Windows 10 version 1703 | Use latest released SDK | Use latest released WDK | Out of support | Out of support |
| Windows 10 version 1607 | Use latest released SDK | Use latest released WDK | Windows Hardware Lab Kit - Microsoft Learn | ADK for Windows 10, version 1607 (Republished in May 2025) |
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | ||
| Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
| Microsoft Visual Studio 2022 version 17.4 | ||
| Microsoft Visual Studio 2022 version 17.6 | ||
| Microsoft Visual Studio 2022 version 17.8 | ||
| Microsoft Visual Studio 2022 version 17.10 | ||
| Windows 11 HLK 22H2 | ||
| Windows 11 HLK 24H2 | ||
| Windows HLK for Windows Server 2022 | ||
| Windows HLK for Windows Server 2019 |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
EPSS
7.3 High
CVSS3
Связанные уязвимости
WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. When a bundle runs as SYSTEM user, Burn uses GetTempPathW which points to an insecure directory C:\Windows\Temp to drop and load multiple binaries. Standard users can hijack the binary before it's loaded in the application resulting in elevation of privileges. This vulnerability is fixed in 3.14.1 and 4.0.5.
WiX based installers are vulnerable to binary hijack when run as SYSTEM
Уязвимость функции GetTempPathW набора инструментов создания установочных пакетов WiX Toolset операционной системы Windows, позволяющая нарушителю повысить свои привилегии
EPSS
7.3 High
CVSS3