CVE-2024-38217
ENISA EUVD: EUVD-2024-37184 ↗
Exploited in the Wild
✓ Confirmed 0-Day
Triaged: March 5, 2026
6 articles
Published: 2024-09-10
EPSS Score
Source: FIRST.org · 2026-05-23
13.77%
probability
This CVE has a 13.77% probability
of being exploited in the next 30 days.
0%
Top 94.4th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)5.4
MEDIUM
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
Description
NVDWindows Mark of the Web Security Feature Bypass Vulnerability
Affected Products
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows Server 2019
10.0.17763.0
Microsoft
Windows Server 2019 (Server Core installation)
10.0.17763.0
Microsoft
Windows Server 2022
10.0.20348.0
Microsoft
Windows 11 version 21H2
10.0.0
Signal Intelligence
Confidence
85%
EPSS
13.77%
CVSS v3.1
5.4
Mentions
6
Last Seen
Sep 16, 2024
CNA Information
CNA Assigner
microsoft
CNA Title
Windows Mark of the Web Security Feature Bypass Vulnerability
Analyst Note
Article [1] explicitly names CVE-2024-38217 as a zero-day actively exploited in attacks using braille space characters. Published September 10, 2024, and patched in Microsoft's September 2024 Patch Tuesday (same month), meeting the zero-day criteria of exploitation before or simultaneous with patch availability.
Triage Info
Decided atMar 05, 2026
Published DateSep 10, 2024