CVE-2024-29988
Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
YesDecision
Descriptions
SmartScreen Prompt Security Feature Bypass Vulnerability
Vulnerabilidad de omisión de la función de seguridad de solicitud de SmartScreen
This vulnerability allows remote attackers to bypass the SmartScreen security feature to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Internet Shortcut (.URL) files. The issue results from the lack of a security check on chained Internet Shortcut files. An attacker can leverage this vulnerability to execute code in the context of the current user.
Microsoft SmartScreen Prompt contains a security feature bypass vulnerability that allows an attacker to bypass the Mark of the Web (MotW) feature. This vulnerability can be chained with CVE-2023-38831 and CVE-2024-21412 to execute a malicious file.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2024-03-22 CVE Reserved
- 2024-04-09 CVE Published
- 2024-04-30 Exploited in Wild
- 2024-05-03 First Exploit
- 2024-05-21 KEV Due Date
- 2024-09-12 EPSS Updated
- 2024-10-09 CVE Updated
CWE
- CWE-693: Protection Mechanism Failure
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/Sploitus/CVE-2024-29988-exploit | 2024-05-03 |
URL | Date | SRC |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29988 | 2024-05-03 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Windows 10 1809 Search vendor "Microsoft" for product "Windows 10 1809" | < 10.0.17763.5696 Search vendor "Microsoft" for product "Windows 10 1809" and version " < 10.0.17763.5696" | x64 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 10 21h2 Search vendor "Microsoft" for product "Windows 10 21h2" | < 10.0.22000.2899 Search vendor "Microsoft" for product "Windows 10 21h2" and version " < 10.0.22000.2899" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 10 22h2 Search vendor "Microsoft" for product "Windows 10 22h2" | < 10.0.22621.3447 Search vendor "Microsoft" for product "Windows 10 22h2" and version " < 10.0.22621.3447" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 11 23h2 Search vendor "Microsoft" for product "Windows 11 23h2" | < 10.0.22631.3447 Search vendor "Microsoft" for product "Windows 11 23h2" and version " < 10.0.22631.3447" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2019 Search vendor "Microsoft" for product "Windows Server 2019" | < 10.0.17763.5696 Search vendor "Microsoft" for product "Windows Server 2019" and version " < 10.0.17763.5696" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2022 Search vendor "Microsoft" for product "Windows Server 2022" | < 10.0.20348.2402 Search vendor "Microsoft" for product "Windows Server 2022" and version " < 10.0.20348.2402" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2022 23h2 Search vendor "Microsoft" for product "Windows Server 2022 23h2" | < 10.0.25398.830 Search vendor "Microsoft" for product "Windows Server 2022 23h2" and version " < 10.0.25398.830" | - |
Affected
|