According to The Verge, the following Microsoft vulnerabilities can affect approximately one billion devices. Any users with outdated versions of Windows are potentially at risk.
Windows Installer Elevation of Privilege Vulnerability
CVE-2024-38014 (CVSS 7.8, high severity)
The vulnerability in the Windows Installer component comes from flaws in access control. When exploited, a local attacker without any privileges can obtain SYSTEM level privileges. After gaining full control of the system, they can then follow through on the attack target, as a high level of privileges allows them to operate as a local administrator and install malware, modify or delete important files, and gain access to confidential data.
Potential number of victims: all Windows users (including Windows Server) who haven't installed the latest security updates.
Signs of exploitation: Microsoft notes cases of the vulnerability's exploitation. CISA also added the vulnerability to its Known Exploited Vulnerabilities Catalog.
Publicly available exploits: unavailable in open sources.
Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2024-38217 (CVSS 5.4, medium severity)
If a user opens a malicious file, attackers can exploit this vulnerability to bypass the SmartScreen security feature in Windows to interfere with the Mark of the Web (MotW) functionality. The Mark of the Web marks files downloaded from untrusted sources to ensure that additional security measures (Windows Defender SmartScreen checks and Protected Mode in Microsoft Office) are activated when opened.
Successful exploitation of this vulnerability could allow attackers to distribute malware disguised as legitimate installers. As a result, users may open dangerous files without realizing the risks because Windows security features are not activated. Exploitation requires the user to perform certain actions.
Potential number of victims: all Windows users (including Windows Server) who haven't installed the latest security updates.
Signs of exploitation: Microsoft notes cases of the vulnerability's exploitation. CISA also added the vulnerability to its Known Exploited Vulnerabilities Catalog. Elastic Security Labs discovered that attackers have been exploiting the vulnerability since at least 2018.
Publicly available exploits: the PoC was published with open access.
Windows MSHTML Platform Spoofing Vulnerability
CVE-2024-43461 (CVSS 8.8, high severity)
Successful exploitation of this vulnerability lets attackers hide the true extension of files downloaded in Internet Explorer. This helps attackers trick users by sending them malicious attachments disguised as legitimate files that can lead to the theft of their personal data or money, system failures, and the risk of further attacks on the device and network. Exploitation of the vulnerability requires the user to carry out certain actions, as the victim must visit a malicious page or open a malicious file.
Potential number of victims: all Windows users (including Windows Server) who haven't installed the latest security updates.
Signs of exploitation: Microsoft notes cases of the vulnerability's exploitation. CISA also added the vulnerability to its Known Exploited Vulnerabilities Catalog. ZDI reported exploitation of the vulnerability in zero-day attacks by Void Banshee to deploy an infostealer.
Publicly available exploits: the PoC was published with open access.
Remediation methods: security updates can be downloaded from official Microsoft pages about each vulnerability: CVE-2024-38014, CVE-2024-38217, CVE-2024-43461.