
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
Microsoft Publisher Security Feature Bypass Vulnerability (CVE-2024-38226) was identified and disclosed on September 10, 2024. This vulnerability affects multiple versions of Microsoft Office and Publisher, including Publisher 2016, Office 2019, and Office 2021 LTSC, in both x64 and x86 architectures (NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 7.3 (HIGH) with the following vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H. This indicates that the vulnerability requires local access, low attack complexity, low privileges, and user interaction, while potentially impacting confidentiality, integrity, and availability at high levels (NVD).
The vulnerability has been classified as a protection mechanism failure (CWE-693) that could lead to security feature bypass in Microsoft Publisher. If successfully exploited, it could result in high impacts to system confidentiality, integrity, and availability (NVD).
Microsoft has released security updates to address this vulnerability. The updates are available through Microsoft Update, Microsoft Update Catalog, and Microsoft Download Center. For Publisher 2016, security update KB5002566 has been released and replaces the previously released security update KB5002492 (Microsoft Support).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”