Windows Mark of the Web Security Feature Bypass Vulnerability
References
Link | Resource |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217 | Patch Vendor Advisory |
https://www.elastic.co/security-labs/dismantling-smart-app-control | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
27 Jan 2025, 21:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* |
References | () https://www.elastic.co/security-labs/dismantling-smart-app-control - Exploit, Third Party Advisory |
21 Nov 2024, 09:25
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Sep 2024, 15:09
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Microsoft windows 10 1809
Microsoft windows Server 2022 23h2 Microsoft Microsoft windows 11 22h2 Microsoft windows 11 21h2 Microsoft windows 10 1507 Microsoft windows 11 24h2 Microsoft windows Server 2012 Microsoft windows Server 2022 Microsoft windows 10 21h2 Microsoft windows 11 23h2 Microsoft windows 10 22h2 Microsoft windows Server 2016 Microsoft windows Server 2019 Microsoft windows 10 1607 Microsoft windows Server 2008 |
|
CWE | NVD-CWE-noinfo | |
References | () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217 - Patch, Vendor Advisory | |
CPE | cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:* |
10 Sep 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-10 17:15
Updated : 2025-01-27 21:38
NVD link : CVE-2024-38217
Mitre link : CVE-2024-38217
CVE.ORG link : CVE-2024-38217
JSON object : View
Products Affected
microsoft
- windows_10_21h2
- windows_server_2019
- windows_server_2016
- windows_server_2022
- windows_10_1607
- windows_11_24h2
- windows_server_2022_23h2
- windows_server_2008
- windows_10_1809
- windows_11_21h2
- windows_10_22h2
- windows_10_1507
- windows_11_23h2
- windows_server_2012
- windows_11_22h2
CWE