V
Scaner-VSvulnerability catalog · v4.2
CVE-2024-38226
MSR
High KEVConfirmedExploit available

Microsoft Publisher Security Feature Bypass Vulnerability

CVSS
7.3
High
EPSS
0.01
p80
Published
2024-01-01
Updated
2024-09-10
Description

Microsoft Publisher Security Feature Bypass Vulnerability

Tags · CWE
KEV
CWE-693
CAPEC-1
CAPEC-17
CAPEC-20
CAPEC-22
CAPEC-36
CAPEC-51
CAPEC-57
CAPEC-59
CAPEC-65
CAPEC-74
CAPEC-87
CAPEC-107
CAPEC-127
CAPEC-237
CAPEC-477
CAPEC-480
CAPEC-668
Affected products
Office_2019Office_long_term_servicing_channelPublisher
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Timeline
2024-01-01
Published
2024-09-10
Added to KEV
2024-09-10
Updated
CVSS 3.1 breakdown
Attack Vector
AV: L
Local (L)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: L
Low (L)
User Interaction
UI: R
Required (R)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: H
High (H)
Availability Impact
A: H
High (H)
Exploit indicators
EPSS
0.014 · p80
Known exploited (KEV)
Yes
MITRE ATT&CK
Inferred via CAPEC
└ via CAPEC-57 · CWE-693
└ via CAPEC-127 · CWE-693
└ via CAPEC-668 · CWE-693
└ via CAPEC-480 · CWE-693
Known exploits — Сканер-ВС
CVE-2024-38226
cisa · https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Enterprise
Affected software
ProductVendorStatus
office_2019*Exploited
office_long_term_servicing_channel*Exploited
publisher*Exploited
WindowsMicrosoftExploited
Source databases
MSR
CVE
Related vulnerabilities