Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38189: CWE-20: Improper Input Validation in Microsoft Microsoft Office 2019

0
High
VulnerabilityCVE-2024-38189cvecve-2024-38189cwe-20
Published: Tue Aug 13 2024 (08/13/2024, 17:30:31 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Office 2019

Description

Microsoft Project Remote Code Execution Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:28:58 UTC

Technical Analysis

CVE-2024-38189 is a remote code execution (RCE) vulnerability identified in Microsoft Project, a component of Microsoft Office 2019 (version 19.0.0). The root cause is improper input validation (CWE-20), which allows specially crafted Project files to trigger memory corruption or similar unsafe behavior, enabling an attacker to execute arbitrary code in the context of the current user. The vulnerability requires no privileges and no authentication, but does require user interaction, such as opening a malicious Project file. The CVSS 3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector and low attack complexity. The exploitability is further elevated by the fact that Microsoft Project files are commonly exchanged in enterprise environments. Although no public exploits have been reported yet, the vulnerability is considered critical due to the potential for complete system compromise. Microsoft has not yet released a patch, but the vulnerability is officially published and tracked by CISA, indicating urgency for mitigation. This vulnerability is particularly concerning for organizations heavily reliant on Microsoft Office 2019, especially those using Microsoft Project for project management and planning, as it could be leveraged for targeted attacks or widespread malware campaigns.

Potential Impact

The potential impact of CVE-2024-38189 is severe for organizations worldwide. Successful exploitation can lead to remote code execution, allowing attackers to gain control over affected systems, steal sensitive data, disrupt operations, or deploy ransomware and other malware. Since Microsoft Office 2019 is widely used in enterprise, government, and industrial sectors, the vulnerability poses a significant risk to confidentiality, integrity, and availability of critical information systems. Attackers could leverage this flaw to move laterally within networks, escalate privileges, or establish persistent footholds. The requirement for user interaction limits mass exploitation but does not eliminate risk, especially in environments where users frequently exchange Project files. The absence of a patch increases exposure time, raising the likelihood of future exploit development. Organizations with poor endpoint security or lacking robust email/file filtering are particularly vulnerable. The impact extends to supply chains and partners relying on Microsoft Office 2019, amplifying the threat landscape.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches immediately upon release to remediate the vulnerability. 2. Until patches are available, implement strict policies to block or quarantine Microsoft Project files (.mpp) from untrusted or external sources, especially via email and file sharing platforms. 3. Educate users about the risks of opening unsolicited or unexpected Project files and encourage verification of file origins. 4. Employ advanced endpoint detection and response (EDR) solutions capable of detecting anomalous behaviors related to Office file exploitation. 5. Use application control or whitelisting to restrict execution of unauthorized code and scripts triggered by Office applications. 6. Enable network segmentation to limit lateral movement if a system is compromised. 7. Regularly back up critical data and verify backup integrity to enable recovery in case of ransomware or destructive attacks. 8. Review and harden Office macro and active content settings to reduce attack surface. 9. Implement multi-factor authentication and least privilege principles to reduce impact of potential compromise. 10. Conduct threat hunting and monitoring for indicators of compromise related to Office exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.217Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb288

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 2/28/2026, 4:28:58 AM

Last updated: 3/25/2026, 5:42:09 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses