Windows MSHTML Platform Security Feature Bypass Vulnerability
CVE-2023-29324

6.5MEDIUM

Key Information:

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC🟣 EPSS 11%πŸ“° News Worthy

Summary

Windows MSHTML Platform Security Feature Bypass Vulnerability

Affected Version(s)

Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.19926

Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.5921

Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.4377

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Easily bypassed patch makes zero-click Outlook flaw exploitable again (CVE-2023-29324) - Help Net Security

Among the vulnerabilities fixed by Microsoft on May 2023 Patch Tuesday is CVE-2023-29324, a bug in the Windows MSHTML Platform.

2 years ago

References

EPSS Score

11% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“°

    First article discovered by Help Net Security

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)1 News Article(s)
.