Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21351: CWE-94: Improper Control of Generation of Code ('Code Injection') in Microsoft Windows 11 Version 23H2

0
High
VulnerabilityCVE-2024-21351cvecve-2024-21351cwe-94
Published: Tue Feb 13 2024 (02/13/2024, 18:02:12 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 11 Version 23H2

Description

Windows SmartScreen Security Feature Bypass Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:05:15 UTC

Technical Analysis

CVE-2024-21351 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code), indicating a code injection flaw within the Windows SmartScreen security feature in Microsoft Windows 11 Version 23H2 (build 10.0.22631.0). SmartScreen is designed to protect users by blocking untrusted or malicious applications and downloads. This vulnerability enables an attacker to bypass these protections, allowing the injection and execution of arbitrary code. The flaw does not require any privileges (AV:N) and has low attack complexity (AC:L), but it does require user interaction (UI:R), such as convincing a user to open a malicious file or link. The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component and does not extend beyond the user context. The impact on confidentiality is low, but integrity is high, and availability is low, reflecting the potential for code execution and system compromise without full data disclosure or denial of service. Although no exploits are currently known in the wild, the vulnerability's characteristics make it a significant risk once weaponized. The lack of an official patch link suggests remediation is pending or in progress. This vulnerability highlights the importance of securing client-side defenses and the risks associated with bypassing security features like SmartScreen.

Potential Impact

The vulnerability poses a significant threat to organizations worldwide by undermining a key security feature designed to prevent execution of untrusted code. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to system compromise, installation of malware, or lateral movement within networks. The integrity of affected systems is at high risk, as attackers can inject malicious code that may evade detection. Confidentiality impact is moderate since direct data leakage is not the primary effect, but compromised systems could be leveraged for data exfiltration. Availability impact is low but could occur if malicious payloads disrupt system operations. The requirement for user interaction limits mass exploitation but targeted phishing or social engineering campaigns could be effective. Organizations relying on Windows 11 23H2, especially in sensitive sectors such as government, finance, healthcare, and critical infrastructure, face elevated risks. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score indicates urgency in mitigation.

Mitigation Recommendations

Organizations should implement a multi-layered defense strategy beyond waiting for an official patch. Immediate actions include: 1) Educate users about the risks of interacting with untrusted files or links, emphasizing caution with SmartScreen warnings. 2) Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious code execution attempts. 3) Restrict execution privileges and use least privilege principles to minimize impact if exploitation occurs. 4) Monitor system and security logs for anomalies related to SmartScreen bypass or code injection activities. 5) Use network segmentation to limit lateral movement from compromised endpoints. 6) Regularly update and harden security configurations, including enabling Windows Defender and other built-in protections. 7) Prepare incident response plans specifically addressing potential SmartScreen bypass scenarios. 8) Once available, promptly apply Microsoft patches or updates addressing this vulnerability. These targeted measures will reduce exposure and improve detection capabilities against exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:19.375Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeaaf9

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 2/28/2026, 9:05:15 AM

Last updated: 3/25/2026, 1:32:10 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses