CVE-2024-3220
Python Interpreter vulnerability analysis and mitigation

Overview

CVE-2024-3220 is a low severity vulnerability affecting CPython's standard library module 'mimetypes'. The vulnerability was discovered and disclosed on February 14, 2025. The issue specifically affects Windows systems where the default list of known file locations are writable, potentially allowing other users to manipulate mime type configurations (Python Security).

Technical details

The vulnerability stems from a defect in the CPython standard library module 'mimetypes' where the default locations of Linux and macOS platforms (such as '/etc/mime.types') are also being used on Windows. On Windows systems, these locations (e.g., 'C:\etc\mime.types') are user-writable, creating a security risk. The vulnerability has been assigned a CVSS score of 5.4 (MEDIUM) with a vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L (NetApp Security).

Impact

When successfully exploited, this vulnerability can lead to two potential impacts: causing MemoryError to be raised on Python runtime startup or having file extensions be interpreted as the incorrect file type. This can result in addition or modification of data or Denial of Service (DoS) (Openwall, NetApp Security).

Mitigation and workarounds

A temporary workaround has been provided: users can call mimetypes.init() with an empty list ('[]') on Windows platforms to avoid using the default list of known file locations. No permanent patch is available yet, and the CVE will be updated once there is a fixed version (Openwall).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management