CVE-2024-38217 vulnerability in Microsoft Products
Published on September 10, 2024
Known Exploited Vulnerability
This Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.
The following remediation steps are recommended / required by October 1, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2024-38217 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 2.8 out of four. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity and availability.
Products Associated with CVE-2024-38217
You can be notified by stack.watch whenever vulnerabilities like CVE-2024-38217 are published in these products:
What versions are vulnerable to CVE-2024-38217?
- Microsoft Windows Server 2008 Version - sp2 x64
- Microsoft Windows Server 2008 Version r2 x64
- Microsoft Windows Server 2008 Version - sp2 x86
- Microsoft Windows Server 2012 Version - x64
- Microsoft Windows Server 2012 Version r2 x64
- Microsoft Windows 10 1507 Fixed in Version 10.0.10240.20766 x64
- Microsoft Windows 10 1809 Fixed in Version 10.0.17763.6293
- Microsoft Windows Server 2019 Fixed in Version 10.0.17763.6293
- Microsoft Windows Server 2022 Fixed in Version 10.0.20348.2700
- Microsoft Windows 11 21h2 Fixed in Version 10.0.22000.3197
- Microsoft Windows 10 21h2 Fixed in Version 10.0.19044.4894
- Microsoft Windows 11 22h2 Fixed in Version 10.0.22621.4169
- Microsoft Windows 10 22h2 Fixed in Version 10.0.19045.4894
- Microsoft Windows 11 23h2 Fixed in Version 10.0.22631.4169
- Microsoft Windows Server 2022 23h2 Fixed in Version 10.0.25398.1128
- Microsoft Windows 11 24h2 Fixed in Version 10.0.26100.1742 arm64
- Microsoft Windows 11 24h2 Fixed in Version 10.0.26100.1742 x64
- Microsoft Windows 10 1507 Fixed in Version 10.0.10240.20766 x86
- Microsoft Windows 10 1607 Fixed in Version 10.0.14393.7336 x86
- Microsoft Windows 10 1607 Fixed in Version 10.0.14393.7336 x64
- Microsoft Windows Server 2016 Fixed in Version 10.0.14393.7336