Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-38200

Опубликовано: 13 авг. 2024
Источник: msrc
CVSS3: 6.5
EPSS Средний

Описание

Microsoft Office Spoofing Vulnerability

Меры по смягчению последствий

The following mitigating factors may be helpful in your situation:

Configuring the Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers policy setting provides the ability to allow, block, or audit outgoing NTLM traffic from a computer running Windows Server 2008, Windows Server 2008 R2, or later to any remote server running the Windows operating system. Performing this mitigation allows you to block or audit all attempts to connect to remote servers through NTLM authentication. Please note: Modifying this policy setting may affect compatibility with client computers, services, and applications.

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.

Am I vulnerable to this issue until I install the August 13, 2024 updates?

No, we identified an alternative fix to this issue that we enabled via Feature Flighting on 7/30/2024. Customers are already protected on all in-support versions of Microsoft Office and Microsoft 365. Customers should still update to the August 13, 2024 updates for the final version of the fix.

When will a final update be available to address this vulnerability?

The Security Updates table will be revised when the update is publicly available. If you wish to be notified when these update is released, we recommend that you register for the security notifications mailer to be alerted of content changes to this CVE. See Microsoft Technical Security Notifications and Coming Soon: New Security Update Guide Notification System.

There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.

Обновления

ПродуктСтатьяОбновление
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2016 (64-bit edition)
Microsoft Office 2019 for 32-bit editions
-
Microsoft Office 2019 for 64-bit editions
-
Microsoft 365 Apps for Enterprise for 32-bit Systems
-
Microsoft 365 Apps for Enterprise for 64-bit Systems
-
Microsoft Office LTSC 2021 for 64-bit editions
-
Microsoft Office LTSC 2021 for 32-bit editions
-

Показывать по

Возможность эксплуатации

Publicly Disclosed

Yes

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

EPSS

Процентиль: 98%
0.52379
Средний

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
больше 1 года назад

Microsoft Office Spoofing Vulnerability

CVSS3: 7.5
github
больше 1 года назад

Microsoft Office Spoofing Vulnerability

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость пакетов программ Microsoft Office и Microsoft 365 Apps for Enterprise, связанная с недостаточной защитой служебных данных, позволяющая нарушителю реализовать спуфинг атаку

EPSS

Процентиль: 98%
0.52379
Средний

6.5 Medium

CVSS3