First published: Tue Mar 14 2023(Updated: )
Microsoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to evade Mark of the Web (MOTW) defenses via a specially crafted malicious file.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows | ||
Microsoft Windows 10 1607 | <10.0.14393.5786 | |
Microsoft Windows 10 1809 | <10.0.17763.4131 | |
Microsoft Windows 10 20h2 | <10.0.19042.2728 | |
Microsoft Windows 10 21h2 | <10.0.19044.2728 | |
Microsoft Windows 10 22h2 | <10.0.19045.2728 | |
Microsoft Windows 11 21h2 | <10.0.22000.1696 | |
Microsoft Windows 11 22h2 | <10.0.22000.1413 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 | ||
=21H2 | ||
=21H2 | ||
=21H2 | ||
=20H2 | ||
=20H2 | ||
=21H2 | ||
=20H2 | ||
=1809 | ||
=1809 | ||
=1607 | ||
=1809 | ||
=22H2 | ||
=22H2 | ||
=22H2 | ||
=1607 | ||
=22H2 | ||
=22H2 | ||
=21H2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24880 is a Microsoft Windows SmartScreen security feature bypass vulnerability that allows an attacker to evade Mark of the Web (MOTW) defenses.
CVE-2023-24880 has a severity rating of 4.4, which is considered medium.
CVE-2023-24880 affects Microsoft Windows by bypassing the SmartScreen security feature, allowing attackers to evade MOTW defenses through a malicious file.
To fix CVE-2023-24880 on Windows 10 version 21H2, install the patch provided by Microsoft (KB5023696) from the official Microsoft catalog update site.
To fix CVE-2023-24880 on Windows 11 version 21H2, install the patch provided by Microsoft (KB5023698) from the official Microsoft catalog update site.