CVE-2024-38112| MSHTML | RCE
| Vulnerability | CVE-2024-38112 |
|---|---|
| Type | MSHTML Platform Spoofing Vulnerability |
| Description | The vulnerability occurs when a file is named with non-printable arbitrary characters to hide its extension. The APT employs various tactics to deceive victims into clicking and running an HTA file, including:
|
| The Impact of the Bug | Exploiting this vulnerability can lead to Remote Code Execution when the victim is tricked into clicking and running an HTA file. This attack can be combined with other vulnerabilities in Internet Explorer, which is now out of support and retired. |
| How to detect if you have a vulnerable application to this attack vector? | several ways :
|
| References | https://research.checkpoint.com/2024/resurrecting-internet-explorer-threat-actors-using-zero-day-tricks-in-internet-shortcut-file-to-lure-victims-cve-2024-38112/ https://www.trendmicro.com/en_us/research/24/g/cve-2024-38112-void-banshee.html https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112 |