Windows MSHTML Platform Security Feature Bypass Vulnerability
CVE-2023-29324
6.5MEDIUM
Key Information:
- Vendor
- Microsoft
- Status
- Vendor
- CVE Published:
- 9 May 2023
Badges
๐พ Exploit Exists๐ก Public PoC๐ฐ News Worthy
Summary
Windows MSHTML Platform Security Feature Bypass Vulnerability
Affected Version(s)
Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.19926
Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.5921
Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.4377
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting ๐
Well keep you posted ๐ง
News Articles
Easily bypassed patch makes zero-click Outlook flaw exploitable again (CVE-2023-29324) - Help Net Security
Among the vulnerabilities fixed by Microsoft on May 2023 Patch Tuesday is CVE-2023-29324, a bug in the Windows MSHTML Platform.
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
- ๐ฐ
First article discovered by Help Net Security
Vulnerability published
Vulnerability Reserved