Skip to main content

CVE-2024-30104: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Microsoft Office 2019

High
VulnerabilityCVE-2024-30104cvecve-2024-30104cwe-59
Published: Tue Jun 11 2024 (06/11/2024, 17:00:05 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Office 2019

Description

Microsoft Office Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 18:10:56 UTC

Technical Analysis

CVE-2024-30104 is a high-severity vulnerability affecting Microsoft Office 2019, specifically version 19.0.0. It is categorized under CWE-59, which pertains to improper link resolution before file access, commonly referred to as 'link following.' This vulnerability allows an attacker to exploit the way Microsoft Office resolves symbolic links or shortcuts before accessing files. By manipulating these links, an attacker can cause Office to open or execute unintended files, leading to remote code execution (RCE). The CVSS 3.1 base score of 7.8 reflects a high-impact vulnerability with local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means that if exploited, an attacker could fully compromise the affected system, gaining control over the victim's machine, stealing sensitive data, or disrupting operations. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a significant risk. The lack of available patches at the time of publication increases the urgency for organizations to implement mitigations and monitor for updates. The vulnerability arises from Office's improper handling of symbolic links, which can be leveraged by attackers to trick the application into executing malicious payloads or accessing unauthorized files, potentially bypassing security controls.

Potential Impact

For European organizations, the impact of CVE-2024-30104 is considerable due to the widespread use of Microsoft Office 2019 in corporate, governmental, and educational environments. Successful exploitation could lead to full system compromise, data breaches involving sensitive personal and corporate information, intellectual property theft, and disruption of critical business processes. Given the high confidentiality, integrity, and availability impacts, organizations could face regulatory penalties under GDPR if personal data is exposed. Additionally, ransomware or other malware could be deployed post-exploitation, causing operational downtime and financial losses. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the exploit, which remains a common attack vector in Europe. The local attack vector implies that attackers need some form of access to the victim's environment, which could be achieved through compromised credentials or insider threats. The absence of known exploits in the wild currently provides a window for proactive defense, but the vulnerability's severity demands immediate attention to prevent future exploitation.

Mitigation Recommendations

1. Apply official patches from Microsoft as soon as they become available to address the vulnerability directly. 2. Until patches are released, implement strict endpoint protection measures, including application whitelisting and behavior-based detection to identify suspicious Office activities related to link resolution. 3. Educate users on the risks of opening unsolicited or unexpected Office documents, especially those received via email or external sources, to reduce the likelihood of triggering the vulnerability. 4. Employ network segmentation and least privilege principles to limit the ability of attackers to gain local access or move laterally within the network. 5. Use advanced email filtering and sandboxing solutions to detect and block malicious Office documents before they reach end users. 6. Monitor logs and endpoint telemetry for unusual file access patterns or attempts to exploit symbolic link handling within Office applications. 7. Disable or restrict the use of symbolic links in environments where feasible, or apply group policy settings to limit Office's ability to follow links in documents. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises resulting from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:15.573Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec13c

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:10:56 PM

Last updated: 7/28/2025, 6:38:01 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats