CVE-2024-49032

Use After Free (CWE-416)

Published: Nov 12, 2024

010
CVSS 7.8EPSS 0.05%High
CVE info copied to clipboard

Summary

Microsoft Office Graphics Remote Code Execution Vulnerability. This vulnerability is classified as a Use After Free (CWE-416) issue in Microsoft Office. It requires user interaction and can be exploited through a local attack vector. The attack complexity is low, which means it's relatively easy for an attacker to exploit once they have local access and can convince a user to interact with a malicious file or application.

Impact

If successfully exploited, this vulnerability could allow an attacker to execute arbitrary code with the same privileges as the current user. Given the high confidentiality, integrity, and availability impacts, a successful attack could lead to unauthorized access to sensitive information, modification of data, or disruption of system availability.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch for this vulnerability is available. Microsoft released the patch on November 12, 2024. It's crucial for the security team to apply this patch as soon as possible to mitigate the risk.

Mitigation

1. Apply the security update provided by Microsoft immediately. 2. Implement the principle of least privilege, ensuring users operate with minimal necessary permissions. 3. Educate users about the risks of interacting with files or applications from untrusted sources. 4. Consider implementing application whitelisting to prevent unauthorized executables from running. 5. Keep all Microsoft Office products updated to the latest version. 6. Use endpoint detection and response (EDR) solutions to detect and prevent potential exploitation attempts. 7. Monitor for any suspicious activities related to Microsoft Office applications.

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Timeline

CVSS

A CVSS base score of 7.8 has been assigned.

Nov 12, 2024 at 5:55 PM / microsoft
First Article

Feedly found the first article mentioning CVE-2024-49032. See article

Nov 12, 2024 at 6:10 PM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Nov 12, 2024 at 6:11 PM
CVE Assignment

NVD published the first details for CVE-2024-49032

Nov 12, 2024 at 6:15 PM
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Nov 12, 2024 at 6:36 PM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (210859)

Nov 13, 2024 at 2:15 AM
EPSS

EPSS Score was set to: 0.05% (Percentile: 22.9%)

Nov 13, 2024 at 5:06 PM
EPSS

EPSS Score was set to: 0.06% (Percentile: 25.4%)

Nov 18, 2024 at 8:29 PM
Static CVE Timeline Graph

Affected Systems

Microsoft/office_long_term_servicing_channel
+null more

Patches

Microsoft
+null more

References

Microsoft Office Graphics Remote Code Execution Vulnerability
Why does the CVE title indicate that this is a remote code execution? Remote Code Execution

News

Microsoft Office Graphics Remote Code Execution Vulnerability
Why does the CVE title indicate that this is a remote code execution? Remote Code Execution
cveNotify : 🚨 CVE-2024-49032Microsoft Office Graphics Remote Code Execution Vulnerability🎖@cveNotify
cveNotify : 🚨 CVE-2024-49032Microsoft Office Graphics Remote Code Execution Vulnerability🎖@cveNotify
2024-45 - Adobe, Mozilla, Canonical, Red Hat, Microsoft, Google, Jenkins, GitHub, Spring 🗂️
Advisory Week Week 45, 2024 National Cyber Awareness System CISA Releases Nineteen Industrial Control Systems Advisories CISA Adds Two Known Exploited Vulnerabilities to Catalog Palo Alto Networks Emphasizes Hardening Guidance Fortinet Releases Security Updates for Multiple Products Microsoft Releases November 2024 Security Updates Adobe Releases Security Updates for Multiple Products Ivanti Releases Security Updates for Multiple Products JCDC’s Collaborative Efforts Enhance Cybersecurity for the 2024 Olympic and Paralympic Games Citrix Releases Security Updates for NetScaler and Citrix Session Recording CISA Releases Five Industrial Control Systems Advisories CISA, FBI, NSA, and International Partners Release Joint Advisory on 2023 Top Routinely Exploited Vulnerabilities CISA Adds Five Known Exploited Vulnerabilities to Catalog Adobe Security Bulletins and Advisories Security updates available for Adobe Photoshop APSB24-89 Security Updates Available for Adobe Commerce APSB24-90 Security Updates Available for Adobe Illustrator APSB24-66 APSB24-87 Security Update Available for Adobe InDesign APSB24-88 Security Updates Available for Adobe Bridge APSB24-77 Security Updates Available for Adobe Audition APSB24-83 Mozilla Security Advisories Security Vulnerabilities fixed in Thunderbird 132.0.1 mfsa2024-62 Security Vulnerabilities fixed in Thunderbird 128.4.3 mfsa2024-61 Ubuntu Security Notices Linux kernel vulnerabilities: USN-7089-6 / USN-7088-5 / USN-7089-5 / USN-7110-1 / USN-7089-4 / USN-7100-2 / USN-7100-1 GD Graphics Library vulnerability: USN-7112-1 Go vulnerabilities: USN-7111-1 / USN-7109-1 Linux kernel vulnerability:
Microsoft’s Security Update in November on High-Risk Vulnerabilities in Multiple Products
On November 13, NSFOCUS CERT detected that Microsoft released a security update patch for November, which fixed 89 security issues, including Windows, Microsoft SQL Server, Microsoft Office, Azure, Open Source Software, Microsoft Visual Studio, System Center and other widely used products, including high-risk vulnerabilities such as privilege escalation vulnerability and remote code execution vulnerability. Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Microsoft Office PowerPoint PPTX File Parsing Use-After-Free Remote Code Execution Vulnerability [CVE-2024-49032]
CVE number = CVE-2024-49032 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office PowerPoint. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PPTX files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Microsoft has issued an update to correct this vulnerability. More details can be found at: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49032 The post Microsoft Office PowerPoint PPTX File Parsing Use-After-Free Remote Code Execution Vulnerability [CVE-2024-49032] appeared first on SystemTek - Technology news and information .
See 36 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:None
User Interaction:Required
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI