CVE-2024-30040
vulnerability analysis and mitigation

Overview

Windows MSHTML Platform Security Feature Bypass Vulnerability (CVE-2024-30040) is a critical security flaw discovered in Microsoft Windows systems. The vulnerability was disclosed on May 14, 2024, and has been confirmed to be actively exploited in the wild. It affects various versions of Windows 10, Windows 11, and Windows Server systems, allowing attackers to bypass Object Linking and Embedding (OLE) mitigations in Microsoft 365 and Microsoft Office (HelpNet Security).

Technical details

The vulnerability has received a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The vulnerability is classified under CWE-20 (Improper Input Validation) and CWE-203 (Observable Discrepancy). To exploit this vulnerability, an attacker needs to convince a user to load and manipulate a specially crafted malicious file, though the user doesn't necessarily need to click or open it directly (NVD).

Impact

A successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary code in the context of the user. The attacker could gain code execution capabilities through user manipulation of a malicious document, potentially leading to complete system compromise with high confidentiality, integrity, and availability impacts (NVD).

Mitigation and workarounds

Microsoft has released security updates to address this vulnerability. Organizations are required to apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. CISA has set a due date of June 4, 2024, for federal agencies to address this vulnerability (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management