CVE-2024-38112

Published Jul 9, 2024

Last updated 6 months ago

Overview

Description
Windows MSHTML Platform Spoofing Vulnerability
Source
secure@microsoft.com
NVD status
Analyzed
Products
windows_10_1507, windows_10_1607, windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_21h2, windows_11_22h2, windows_11_23h2, windows_server_2008, windows_server_2012, windows_server_2016, windows_server_2019, windows_server_2022, windows_server_2022_23h2

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.5
Impact score
5.9
Exploitability score
1.6
Vector string
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity
HIGH

Known exploits

Data from CISA

Vulnerability name
Microsoft Windows MSHTML Platform Spoofing Vulnerability
Exploit added on
Jul 9, 2024
Exploit action due
Jul 30, 2024
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

secure@microsoft.com
CWE-451
nvd@nist.gov
NVD-CWE-Other

Social media

Hype score
Not currently trending
  1. Microsoft has released a critical fix for a zero-day vulnerability in Windows MSHTML (CVE-2024-38112). I 👉 At Powerful IT Systems, we don’t wait for things to break. #WindowsSecurity #powerfulitsystems https://t.co/hNppVhYoVd

    @MKEITservices

    21 Jul 2025

    58 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. : 🚨 Urgent Windows Alert: Microsoft patches CVE-2024-38112—hackers used fake PDF shortcuts to spread malware. Update your system now! 🛡️ https://t.co/wC7lBlRKcs

    @Shoukat_Sukkur

    21 Jul 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. : 🚨 Urgent Windows Alert: Microsoft patches CVE-2024-38112—hackers used fake PDF shortcuts to spread malware. Update your system now! 🛡️ https://t.co/GhkLXJGzM5

    @Shoukat_Sukkur

    21 Jul 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. Patch out for CVE-2024-49041, an Edge vulnerability we disclosed to @Microsoft. This finding came as a result of our previous disclosure of CVE-2024-43461 and CVE-2024-38112. A case of narrow patching in Internet Explorer vs. Microsoft Edge! #infosec https://t.co/lKtnGhtxpJ

    @gothburz

    10 Dec 2024

    2753 Impressions

    5 Retweets

    15 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  5. WATCH 🎬: Trend Micro Vision One takes on the Void Banshee campaign exploiting CVE-2024-38112. Watch our comprehensive video to see detection in action and learn how to stay protected. For the full report, click here: https://t.co/C20leQZf7N #BHUSA https://t.co/vE2Lo0BnkI

    @TrendMicro

    1 Nov 2024

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations