Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43573: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Windows 10 Version 22H2

0
Medium
VulnerabilityCVE-2024-43573cvecve-2024-43573cwe-79
Published: Tue Oct 08 2024 (10/08/2024, 17:35:31 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 22H2

Description

Windows MSHTML Platform Spoofing Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:32:19 UTC

Technical Analysis

CVE-2024-43573 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in the MSHTML platform component of Microsoft Windows 10 Version 22H2 (build 10.0.19045.0). MSHTML is the rendering engine used by Internet Explorer and some legacy components that handle web content within Windows. The vulnerability arises from improper neutralization of input during web page generation, which allows an attacker to inject malicious scripts that execute in the context of the affected system's user session. This can lead to unauthorized disclosure of information, such as cookies or session tokens, potentially enabling further attacks like session hijacking or phishing. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requiring no privileges (PR:N) but does require user interaction (UI:R), such as visiting a malicious webpage or opening crafted content. The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). No public exploits are known at this time, and Microsoft has not yet published patches, though the vulnerability is officially reserved and published in the CVE database. This vulnerability primarily affects systems running the specified Windows 10 version and components relying on MSHTML for rendering web content.

Potential Impact

The primary impact of CVE-2024-43573 is on the confidentiality of affected systems. Successful exploitation allows attackers to execute arbitrary scripts in the context of the victim's user session, potentially exposing sensitive information such as authentication tokens, personal data, or internal network information. While the vulnerability does not directly affect system integrity or availability, the stolen information could facilitate further attacks like credential theft, phishing, or lateral movement within a network. Organizations with users running Windows 10 Version 22H2 are at risk, especially if users frequently access untrusted web content or receive malicious links via email or messaging platforms. The requirement for user interaction limits automated exploitation but does not eliminate risk, particularly in environments with high exposure to web-based threats. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation once attackers develop reliable attack vectors. Enterprises relying on legacy applications or components that use MSHTML are particularly vulnerable. The vulnerability could be leveraged in targeted attacks against high-value individuals or organizations, potentially impacting sectors such as government, finance, healthcare, and critical infrastructure.

Mitigation Recommendations

To mitigate CVE-2024-43573, organizations should implement the following specific measures: 1) Monitor Microsoft security advisories closely and apply patches promptly once released for Windows 10 Version 22H2 to remediate the vulnerability at the source. 2) Employ web content filtering and URL reputation services to block access to known malicious or suspicious websites that could host exploit payloads. 3) Configure browsers and applications to disable or limit the use of legacy MSHTML components where possible, migrating to modern, more secure rendering engines. 4) Enforce strict content security policies (CSP) and input validation on internal web applications to reduce the risk of XSS exploitation. 5) Educate users about the risks of interacting with unsolicited links or attachments, emphasizing caution with unknown or unexpected web content. 6) Utilize endpoint detection and response (EDR) solutions to identify anomalous script execution or suspicious behaviors indicative of exploitation attempts. 7) Implement network segmentation to limit the impact of any potential compromise resulting from this vulnerability. 8) Regularly review and update security configurations to minimize attack surface related to legacy components. These targeted actions go beyond generic advice by focusing on the specific nature of the MSHTML XSS vulnerability and the affected Windows version.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-08-14T01:08:33.544Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b5247d717aace26b39

Added to database: 10/21/2025, 7:06:29 PM

Last enriched: 2/28/2026, 6:32:19 AM

Last updated: 3/26/2026, 6:48:30 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses