Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21351: CWE-94: Improper Control of Generation of Code ('Code Injection') in Microsoft Windows 11 Version 23H2

0
High
VulnerabilityCVE-2024-21351cvecve-2024-21351cwe-94
Published: Tue Feb 13 2024 (02/13/2024, 18:02:12 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 11 Version 23H2

Description

Windows SmartScreen Security Feature Bypass Vulnerability

AI-Powered Analysis

AILast updated: 10/21/2025, 21:07:42 UTC

Technical Analysis

CVE-2024-21351 is a vulnerability classified under CWE-94, indicating improper control of code generation, commonly known as code injection. It affects Microsoft Windows 11 Version 23H2 (build 10.0.22631.0) and specifically targets the SmartScreen security feature, which is designed to protect users from running untrusted or malicious applications and files. The vulnerability allows an attacker to bypass SmartScreen protections, effectively enabling the injection and execution of malicious code that would otherwise be blocked. The attack vector is network-based (AV:N), requiring no privileges (PR:N), but does require user interaction (UI:R), such as convincing a user to open a malicious file or link. The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other system components. The impact on confidentiality is low, but integrity is high, and availability is low, indicating that while data leakage is limited, the attacker can significantly alter system behavior or code execution. The CVSS score of 7.6 reflects a high-severity issue due to ease of exploitation and potential damage. No patches were linked at the time of reporting, and no known exploits in the wild have been observed, but the vulnerability is publicly disclosed and should be addressed promptly. The bypass of SmartScreen undermines a critical security control in Windows 11, increasing the risk of malware infections and targeted attacks.

Potential Impact

For European organizations, this vulnerability poses a significant risk as it undermines a key security feature designed to prevent execution of malicious code. Organizations relying on Windows 11 23H2 for endpoint security could face increased exposure to malware, ransomware, and targeted code injection attacks. The integrity of systems can be compromised, potentially allowing attackers to execute arbitrary code, escalate privileges, or persist undetected. Confidentiality impact is limited but not negligible, as code injection can facilitate further exploitation or lateral movement. Availability impact is low but could occur if injected code disrupts system operations. The requirement for user interaction means social engineering or phishing campaigns could be leveraged to exploit this vulnerability. European enterprises with critical infrastructure, financial services, healthcare, and government sectors are particularly at risk due to the potential for targeted attacks leveraging this bypass. The absence of known exploits in the wild provides a window for proactive mitigation, but the public disclosure increases the risk of future exploitation.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches immediately once released for Windows 11 Version 23H2. 2. Until patches are available, implement application whitelisting to restrict execution of untrusted or unknown applications. 3. Enhance endpoint detection and response (EDR) solutions to monitor for suspicious behaviors indicative of code injection or SmartScreen bypass attempts. 4. Educate users on phishing and social engineering risks to reduce the likelihood of user interaction exploitation. 5. Use network-level protections such as web filtering and email security gateways to block malicious payloads and links. 6. Employ multi-factor authentication and least privilege principles to limit the impact of potential code execution. 7. Regularly audit and harden system configurations to reduce attack surface and disable unnecessary features that could be leveraged. 8. Consider deploying additional sandboxing or isolation technologies for high-risk user groups or systems. 9. Maintain comprehensive backup and recovery plans to mitigate potential availability impacts from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:19.375Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeaaf9

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 10/21/2025, 9:07:42 PM

Last updated: 12/4/2025, 8:43:32 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats