Zero-day vulnerability in Windows

Protection Mechanism Failure
CVE-2024-38217

Vulnerability details

Advisory: SB2024091091 - Security features bypass in Microsoft Windows Mark of the Web

Vulnerable component: Windows

CVE-ID: CVE-2024-38217

CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L/E:H/RL:O/RC:C

CWE-ID: CWE-693 - Protection Mechanism Failure

Description:

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient implementation of security measures. An attacker can trick the victim into downloading a specially crafted file, evade Mark of the Web (MOTW) defenses and bypass security features such as SmartScreen Application Reputation security check and/or the legacy Windows Attachment Services security prompt.

Note, the vulnerability is being actively exploited in the wild.

External links:

https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38217