Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-38189

Опубликовано: 13 авг. 2024
Источник: msrc
CVSS3: 8.8
EPSS Средний

Описание

Microsoft Project Remote Code Execution Vulnerability

Меры по смягчению последствий

The following mitigating factors might be helpful in your situation:

Microsoft strongly recommends customers do not disable the Block macros from running in Office files from the Internet policy which protects against this vulnerability. However, customers who have disabled this policy can alternatively enable VBA Macro Notification Settings to protect their systems from this vulnerability being exploited.

FAQ

How could an attacker exploit this vulnerability?

Exploitation requires the victim to open a malicious Microsoft Office Project file on a system where the Block macros from running in Office files from the Internet policy is disabled and VBA Macro Notification Settings are not enabled allowing the attacker to perform remote code execution.

  • In an email attack scenario, an attacker could send the malicious file to the victim and convince them to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a malicious file designed to exploit the vulnerability.

An attacker would have no way to force the victim to visit the website. Instead, an attacker would have to convince the victim to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the malicious file.

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.

Обновления

ПродуктСтатьяОбновление
Microsoft Project 2016 (32-bit edition)
Microsoft Project 2016 (64-bit edition)
Microsoft Office 2019 for 32-bit editions
-
Microsoft Office 2019 for 64-bit editions
-
Microsoft 365 Apps for Enterprise for 32-bit Systems
-
Microsoft 365 Apps for Enterprise for 64-bit Systems
-
Microsoft Office LTSC 2021 for 64-bit editions
-
Microsoft Office LTSC 2021 for 32-bit editions
-

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

Yes

Latest Software Release

Exploitation Detected

EPSS

Процентиль: 98%
0.54672
Средний

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
больше 1 года назад

Microsoft Project Remote Code Execution Vulnerability

CVSS3: 8.8
github
больше 1 года назад

Microsoft Project Remote Code Execution Vulnerability

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость пакетов программ Microsoft Office, Microsoft 365 Apps for Enterprise и программы управления проектами Microsoft Project, связанная с ошибками при обработке входных данных, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 98%
0.54672
Средний

8.8 High

CVSS3