Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-38213

Опубликовано: 13 авг. 2024
Источник: msrc
CVSS3: 6.5
EPSS Высокий

Описание

Windows Mark of the Web Security Feature Bypass Vulnerability

FAQ

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass the SmartScreen user experience.

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.

Обновления

ПродуктСтатьяОбновление
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows Server 2016 (Server Core installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

Yes

Latest Software Release

Exploitation Detected

DOS

N/A

EPSS

Процентиль: 99%
0.72447
Высокий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
10 месяцев назад

Windows Mark of the Web Security Feature Bypass Vulnerability

CVSS3: 6.5
github
10 месяцев назад

Windows Mark of the Web Security Feature Bypass Vulnerability

CVSS3: 6.5
fstec
10 месяцев назад

Уязвимость механизма Mark-of-the-Web (MoTW) операционных систем Microsoft Windows, позволяющая нарушителю выполнить обход пользовательского интерфейса SmartScreen

EPSS

Процентиль: 99%
0.72447
Высокий

6.5 Medium

CVSS3