CVE-2024-21412

ENISA EUVD: EUVD-2024-19121 ↗
Exploited in the Wild ✓ Confirmed 0-Day
Triaged: March 5, 2026 15 articles Published: 2024-02-13

EPSS Score

Source: FIRST.org · 2026-05-23
93.78%
probability
This CVE has a 93.78% probability of being exploited in the next 30 days.
0% Top 99.9th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
8.1
HIGH
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:F/RL:O/RC:C

Description

NVD
Internet Shortcut Files Security Feature Bypass Vulnerability

Affected Products

Microsoft
Windows 11 version 21H2
10.0.0
Microsoft
Windows 10 Version 1809
10.0.0
Microsoft
Windows 10 Version 21H2
10.0.19043.0
Microsoft
Windows Server 2022
10.0.20348.0
Microsoft
Windows 11 version 22H2
10.0.22621.0

Exploits & PoC

lsr00ter/CVE-2024-21412_Water-Hydra

POC code according to trendmicro's research

8 2024-03-21
1 repo — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
85%
EPSS 93.78%
CVSS v3.1 8.1
Mentions 15
Last Seen Aug 13, 2024

CNA Information

CNA Assigner
microsoft
CNA Title
Internet Shortcut Files Security Feature Bypass Vulnerability

Analyst Note

CVE-2024-21412 is explicitly named as one of two Windows zero-days fixed in Microsoft's February 2024 Patch Tuesday. Multiple sources confirm exploitation in the wild prior to patch availability, with reports of malware attacks leveraging this Internet Shortcut Files bypass. The CVE publication date (2024-02-13) aligns with the patch release, and exploitation is documented in active attacks.

Threat Actors 26

MuddyWater
apt_group Information theft and espionage 🇮🇷 IR
Lazarus Group
apt_group Information theft and espionage 🇰🇵 KP
Void Arachne
apt_group Information theft and espionage 🇨🇳 CN
Cobalt
apt_group Financial crime 🇷🇺 RU
APT37
apt_group Information theft and espionage 🇰🇵 KP
APT 28
apt_group Information theft and espionage 🇷🇺 RU
Kimsuky
apt_group Information theft and espionage 🇰🇷 KR
CHRYSENE
apt_group Information theft and espionage 🇮🇷 IR
Vicious Panda
apt_group Information theft and espionage 🇨🇳 CN
SCATTERED SPIDER
apt_group Financial crime 🇺🇸 US
UAC-0020
apt_group 🇺🇦 UA
Infy
apt_group Information theft and espionage 🇮🇷 IR
Evilnum
apt_group Information theft and espionage
TA428
apt_group Information theft and espionage 🇨🇳 CN
SideWinder
apt_group 🇮🇳 IN
RAZOR TIGER
apt_group Information theft and espionage 🇮🇳 IN
Larva-208
apt_group 🇷🇺 RU
Opal Sleet
apt_group 🇰🇵 KP
Void Banshee
apt_group unknown
TA571
apt_group 🇷🇺 RU
SmugX
apt_group 🇨🇳 CN
The White Company
apt_group Information theft and espionage 🇨🇳 CN
Mana Team
apt_group 🇨🇳 CN
Operation Dragon Castling
apt_group Information theft and espionage 🇨🇳 CN
APT 5
apt_group Information theft and espionage 🇨🇳 CN
DarkCasino
apt_group Financial gain

Triage Info

Decided atMar 05, 2026
Published DateFeb 13, 2024