CVE-2024-43573
vulnerability analysis and mitigation

Overview

Windows MSHTML Platform Spoofing Vulnerability (CVE-2024-43573) is a security flaw affecting various versions of Microsoft Windows operating systems. The vulnerability was discovered and disclosed in October 2024, affecting multiple Windows versions including Windows 10, Windows 11, and Windows Server editions (NVD).

Technical details

The vulnerability has received a CVSS v3.1 base score of 8.1 (HIGH) from NIST with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N, while Microsoft assigned it a medium severity score of 6.5. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) according to Microsoft's assessment (NVD).

Impact

The vulnerability could potentially allow an attacker to achieve high levels of confidentiality and integrity compromise if successfully exploited. Based on the CVSS scoring, while availability is not impacted, the vulnerability poses significant risks to system confidentiality and integrity (NVD).

Mitigation and workarounds

Microsoft has released security updates to address this vulnerability across affected systems. Organizations are advised to apply vendor-provided patches or discontinue product use if mitigations are unavailable. Multiple KB updates have been released for different Windows versions, including KB5044286, KB5044293, KB5044277, KB5044273, and others (Rapid7).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management