Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-29187

Опубликовано: 13 мая 2025
Источник: msrc
CVSS3: 7.3
EPSS Низкий

Описание

GitHub: CVE-2024-29187 WiX Burn-based bundles are vulnerable to binary hijack when run as SYSTEM

Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.

FAQ

According to the CVSS metric, user interaction is required (UI:R) and privileges required  is low (PR:L). What does that mean for this vulnerability?

An authorized attacker must send the user a malicious file and convince the user to open it.

Why is this GitHub CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Wix Toolset software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

What is the mitigation strategy for Microsoft developer toolkits that are affected by this vulnerability?

Microsoft is committed to ensuring the security and integrity of our products. We are pleased to announce that an update in reference to the WiX vulnerability (CVE-2024-29187), which affect various kits, has been released. This vulnerability, which allows for binary hijacking when the installer is run as SYSTEM, was publicly disclosed on GitHub in March 2024.

Following are the mitigation steps we have taken for each toolkit:

Windows Assessment and Deployment Kit (Windows ADK) and Windows PE add-on

Update: As of May 29, 2025, mitigations are also available for Windows Assessment and Deployment Kit (Windows ADK) and Windows PE add-on.

The WiX vulnerability has been addressed in the following ADK versions:

  • ADK and ADK WinPE Add-on version 10.1.26100.2454 and later
  • ADK and ADK WinPE Add-on version 10.1.25398.1 (Republished in January 2025)
  • ADK and ADK WinPE Add-on for Windows 11, version 22H2 (Republished in May 2025)
  • ADK and ADK WinPE Add-on for Windows Server 2022 (Republished in May 2025)
  • ADK and ADK WinPE Add-on for Windows 10, version 2004 (Republished in May 2025)
  • ADK and ADK WinPE Add-on for Windows 10, version 1809 (Republished in May 2025)
  • ADK for Windows 10, version 1607 (Republished in May 2025)

Because older ADK releases are susceptible to the WiX vulnerability, we recommend that customers always use the latest released ADK. If one of the ADK versions (prior to version 10.1.26100.2454) from the preceding list must be used, make sure to install it with the new links provided in (https://learn.microsoft.com/en-us/windows-hardware/get-started/adk-install#other-adk-downloads)[Download and install the Windows ADK - Other ADK downloads]. As a result, other older ADK versions will no longer be distributed.

See the Summary Table at the end of this FAQ for the ADK and ADK WinPE Add-on that is applicable to your system.

Windows Driver Kit (WDK)

The WiX vulnerability has been addressed in WDK version 10.0.26100.1591 and later. The latest WDK supports driver development for Windows 10, Windows Server 2016, and all later client and server versions.

Because older WDK releases are susceptible to the WiX vulnerability and the latest kits include the most secure and updated tools and compilers, we recommend that customers always use the latest released WDK. As a result, older WDK versions will no longer be distributed. See https://learn.microsoft.com/windows-hardware/drivers/download-the-wdk for more information.

Software Development Kit (SDK)

The WiX vulnerability has been addressed in SDK version 10.0.26100.1742 and later. The latest SDK for Windows 11 can be used to build Universal Windows Platform (UWP) and Win32 apps for Windows 11, version 24H2, and earlier Windows releases.

Since older SDK versions are affected by the WiX vulnerability and the latest releases offer the most secure and updated tools, we recommend always using the latest SDK. See the https://developer.microsoft.com/en-us/windows/downloads/windows-sdk/ for more information.

Hardware Lab Kit (HLK)

We have serviced and released older versions of HLK with fixes for the WiX vulnerability. Customers are encouraged to update to either the latest HLK version or a matching serviced version when testing drivers for older operating systems. See https://learn.microsoft.com/windows-hardware/test/hlk/ for more information.

Mitigations for additional kits are in process.

Summary Table

The following table provides a breakdown of Windows version and the recommended kits to use.

Windows VersionSDKWDKHLKADK
Windows 11 version 24H2, Windows Server 202524H2_SDK24H2_WDKWindows Hardware Lab Kit - Microsoft LearnADK 10.1.26100.2454 (December 2024) or later
Windows 11 version 23H2Use latest released SDKUse latest released WDKWindows Hardware Lab Kit - Microsoft LearnADK 10.1.25398.1 (Republished in January 2025)
Windows 11 version 22H2Use latest released SDKUse latest released WDKWindows Hardware Lab Kit - Microsoft LearnADK Windows 11, version 22H2 (Republished in May 2025)
Windows Server 2022Use latest released SDKUse latest released WDKWindows HLK for Windows Server 2022ADK for Windows Server 2022 (Republished in May 2025)
Windows 10 versions 22H2, 21H2, 21H, 20H2 and 2004Use latest released SDKUse latest released WDKWindows HLK for Windows 10, version 2004ADK for Windows 10, version 2004 (Republished in May 2025)
Windows version 1903Use latest released SDKUse latest released WDKOut of supportOut of support
Windows 10 version 1809, Windows Server 2019Use latest released SDKUse latest released WDKWindows Hardware Lab Kit - Microsoft LearnADK for Windows 10, version 1809 (Republished in May 2025)
Windows 10 version 1803Use latest released SDKUse latest released WDKOut of supportOut of support
Windows 10 version 1709Use latest released SDKUse latest released WDKOut of supportOut of support
Windows 10 version 1703Use latest released SDKUse latest released WDKOut of supportOut of support
Windows 10 version 1607Use latest released SDKUse latest released WDKWindows Hardware Lab Kit - Microsoft LearnADK for Windows 10, version 1607 (Republished in May 2025)

Обновления

ПродуктСтатьяОбновление
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
Microsoft Visual Studio 2022 version 17.4
Microsoft Visual Studio 2022 version 17.6
Microsoft Visual Studio 2022 version 17.8
Microsoft Visual Studio 2022 version 17.10
Windows 11 HLK 22H2
Windows 11 HLK 24H2
Windows HLK for Windows Server 2022
Windows HLK for Windows Server 2019

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

EPSS

Процентиль: 18%
0.00058
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
nvd
почти 2 года назад

WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. When a bundle runs as SYSTEM user, Burn uses GetTempPathW which points to an insecure directory C:\Windows\Temp to drop and load multiple binaries. Standard users can hijack the binary before it's loaded in the application resulting in elevation of privileges. This vulnerability is fixed in 3.14.1 and 4.0.5.

CVSS3: 7.3
github
почти 2 года назад

WiX based installers are vulnerable to binary hijack when run as SYSTEM

CVSS3: 7.3
fstec
почти 2 года назад

Уязвимость функции GetTempPathW набора инструментов создания установочных пакетов WiX Toolset операционной системы Windows, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 18%
0.00058
Низкий

7.3 High

CVSS3