{ "id": "CVE-2024-43487", "sourceIdentifier": "secure@microsoft.com", "published": "2024-09-10T17:15:36.230", "lastModified": "2024-09-18T14:10:20.320", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mark of the Web Security Feature Bypass Vulnerability" }, { "lang": "es", "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad Mark of the Web de Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "secure@microsoft.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-693" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.10240.20766", "matchCriteriaId": "85DD5735-7C22-4A98-B404-08FEF44A640F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.10240.20766", "matchCriteriaId": "83550045-529B-4968-A543-C9D298C0F31D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.14393.7336", "matchCriteriaId": "90027BBC-56AF-4F14-A118-53BBA694A0CD" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.14393.7336", "matchCriteriaId": "DFB6CBF4-DA4A-4743-B8A1-3E41FCBEEBEC" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.6293", "matchCriteriaId": "3A9450F3-BE07-4F9B-9C2B-29208AB91A9C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.19044.4894", "matchCriteriaId": "30C7FEB1-00AE-42A6-BBAA-A30081BD4A83" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.19045.4894", "matchCriteriaId": "6FBDC450-FB5A-469C-8D38-9586CE5A6F48" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.19045.4894", "matchCriteriaId": "6A08D353-356F-4BB0-A43F-15EBD6E2FB83" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19045.4894", "matchCriteriaId": "13DBA791-6F77-4DA1-8BF4-BA7C299C6188" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:x64:*", "matchCriteriaId": "F73D1308-DB13-4B6C-A66F-5542FDCA749C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*", "matchCriteriaId": "8968BAC8-A1DB-4F88-89F8-4BE47919C247" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.14393.7336", "matchCriteriaId": "A6291C92-7D32-4CC2-B601-FAF5B70F3BFD" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.6293", "matchCriteriaId": "BD2C9E88-C858-4B3D-A8C5-251DD6B69FD6" } ] } ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43487", "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ] } ] }