
Cloud Vulnerability DB
A community-led vulnerabilities database
Microsoft Publisher Security Feature Bypass Vulnerability (CVE-2024-38226) was identified and disclosed on September 10, 2024. This vulnerability affects multiple versions of Microsoft Office and Publisher, including Publisher 2016, Office 2019, and Office 2021 LTSC, in both x64 and x86 architectures (NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 7.3 (HIGH) with the following vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H. This indicates that the vulnerability requires local access, low attack complexity, low privileges, and user interaction, while potentially impacting confidentiality, integrity, and availability at high levels (NVD).
The vulnerability has been classified as a protection mechanism failure (CWE-693) that could lead to security feature bypass in Microsoft Publisher. If successfully exploited, it could result in high impacts to system confidentiality, integrity, and availability (NVD).
Microsoft has released security updates to address this vulnerability. The updates are available through Microsoft Update, Microsoft Update Catalog, and Microsoft Download Center. For Publisher 2016, security update KB5002566 has been released and replaces the previously released security update KB5002492 (Microsoft Support).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."