Protection Mechanism Failure (CWE-693)
Microsoft Publisher has a security feature bypass vulnerability. This vulnerability is categorized as HIGH severity with a CVSS v3.1 base score of 7.3. The attack vector is LOCAL, requires user interaction, and can be executed with low privileges. The vulnerability impacts confidentiality, integrity, and availability, all rated as HIGH.
If exploited, this vulnerability could allow an attacker to bypass security features in Microsoft Publisher. The attacker could potentially gain unauthorized access to sensitive information, modify data, or disrupt the availability of the system. Given the HIGH impact on confidentiality, integrity, and availability, successful exploitation could lead to significant compromise of the affected system's security. The vulnerability is actively being exploited in the wild and was added to the CISA Known Exploited Vulnerability list.
There is no evidence that a public proof-of-concept exists. The vulnerability is actively being exploited in the wild and was added to the CISA Known Exploited Vulnerability list. Its exploitation has been reported by various sources, including anoopcnair.com.
A patch is available for this vulnerability. Microsoft released the patch on September 10, 2024.
1. Apply the security update provided by Microsoft as soon as possible. 2. Limit user privileges to reduce the impact of potential exploitation. 3. Implement the principle of least privilege for users who need to work with Microsoft Publisher. 4. Educate users about the risks of interacting with untrusted files or links, as the vulnerability requires user interaction. 5. Consider using application whitelisting or other security measures to prevent unauthorized execution of files. 6. Monitor systems for any suspicious activities that might indicate exploitation attempts.
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
Detection for the vulnerability has been added to Qualys (110476)
A CVSS base score of 7.3 has been assigned.
Feedly found the first article mentioning CVE-2024-38226. See article
Feedly estimated the CVSS score as HIGH
Feedly estimated the CVSS score as MEDIUM
NVD published the first details for CVE-2024-38226
Attacks in the wild have been reported by HTMD Community Modern Device Management News & Guides. See article
Attacks in the wild have been reported by CISA Known Exploited Vulnerability.
Detection for the vulnerability has been added to Nessus (206892)