CVE-2024-38217

ENISA EUVD: EUVD-2024-37184 ↗
Exploited in the Wild ✓ Confirmed 0-Day
Triaged: March 5, 2026 6 articles Published: 2024-09-10

EPSS Score

Source: FIRST.org · 2026-05-23
13.77%
probability
This CVE has a 13.77% probability of being exploited in the next 30 days.
0% Top 94.4th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
5.4
MEDIUM
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C

Description

NVD
Windows Mark of the Web Security Feature Bypass Vulnerability

Affected Products

Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows Server 2019
10.0.17763.0
Microsoft
Windows Server 2019 (Server Core installation)
10.0.17763.0
Microsoft
Windows Server 2022
10.0.20348.0
Microsoft
Windows 11 version 21H2
10.0.0

Signal Intelligence

Confidence
85%
EPSS 13.77%
CVSS v3.1 5.4
Mentions 6
Last Seen Sep 16, 2024

CNA Information

CNA Assigner
microsoft
CNA Title
Windows Mark of the Web Security Feature Bypass Vulnerability

Analyst Note

Article [1] explicitly names CVE-2024-38217 as a zero-day actively exploited in attacks using braille space characters. Published September 10, 2024, and patched in Microsoft's September 2024 Patch Tuesday (same month), meeting the zero-day criteria of exploitation before or simultaneous with patch availability.

Triage Info

Decided atMar 05, 2026
Published DateSep 10, 2024