Improper Encoding or Escaping of Output (CWE-116)
Windows App Installer Spoofing Vulnerability. This vulnerability is associated with improper encoding or escaping of output (CWE-116) in the Windows App Installer. It has a CVSS v3.1 base score of 7.8, indicating a high severity. The vulnerability requires local access and user interaction but does not require privileges to exploit.
If successfully exploited, this vulnerability could lead to high impacts on confidentiality, integrity, and availability of the affected system. An attacker who successfully exploits this vulnerability could potentially execute arbitrary code with elevated privileges, manipulate data, or cause denial of service. The attack vector is local, which means the attacker would need access to the target system, and user interaction is required for the attack to succeed.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available for this vulnerability. Microsoft released the patch on August 13, 2024. The vulnerability affects Microsoft App Installer versions prior to 1.22.11261.0.
To mitigate this vulnerability, it is strongly recommended to apply the latest security updates provided by Microsoft. Specifically, update the Microsoft App Installer to version 1.22.11261.0 or later. Additionally, as the vulnerability requires user interaction, educating users about the risks of running untrusted applications or scripts can help reduce the risk of exploitation. Implement the principle of least privilege and restrict local access where possible to minimize the potential impact of this vulnerability.
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
A CVSS base score of 7.8 has been assigned.
Feedly found the first article mentioning CVE-2024-38177. See article
NVD published the first details for CVE-2024-38177
Feedly estimated the CVSS score as MEDIUM
EPSS Score was set to: 0.05% (Percentile: 20.9%)