Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43573: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Windows 10 Version 22H2

0
Medium
VulnerabilityCVE-2024-43573cvecve-2024-43573cwe-79
Published: Tue Oct 08 2024 (10/08/2024, 17:35:31 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 22H2

Description

Windows MSHTML Platform Spoofing Vulnerability

AI-Powered Analysis

AILast updated: 10/21/2025, 19:29:03 UTC

Technical Analysis

CVE-2024-43573 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in the MSHTML platform component of Microsoft Windows 10 Version 22H2 (build 10.0.19045.0). The vulnerability arises due to improper neutralization of input during web page generation, which allows an attacker to inject malicious scripts or spoof content. This can lead to scenarios where users are deceived by crafted web pages, potentially exposing sensitive information or enabling further social engineering attacks. The vulnerability is remotely exploitable over the network without requiring privileges or authentication but does require user interaction, such as clicking a malicious link or visiting a compromised website. The CVSS v3.1 base score is 6.5, reflecting a medium severity level, with a vector indicating low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality but no impact on integrity or availability. No known exploits have been reported in the wild as of the publication date. The vulnerability is significant because MSHTML is a core component used by Internet Explorer and legacy applications relying on its rendering engine, which remain in use in many enterprise environments. Attackers could leverage this flaw to conduct phishing or spoofing attacks that appear legitimate to users, potentially leading to credential theft or information disclosure. The lack of an official patch at the time of reporting necessitates interim mitigations to reduce exposure.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality, as attackers can exploit it to perform spoofing attacks that may lead to sensitive data disclosure or credential theft. Since Windows 10 Version 22H2 is widely deployed in enterprise environments across Europe, especially in sectors reliant on legacy applications or Internet Explorer components, the attack surface is significant. The requirement for user interaction means that phishing campaigns or malicious websites could be used as vectors, increasing the risk for organizations with less mature user awareness programs. While the vulnerability does not affect system integrity or availability, the potential for information leakage can have serious consequences, including regulatory non-compliance under GDPR if personal data is exposed. Additionally, the medium severity rating suggests that while the threat is not critical, it should not be ignored, especially in high-value targets such as financial institutions, government agencies, and critical infrastructure operators in Europe.

Mitigation Recommendations

Organizations should prioritize deploying any official patches or updates released by Microsoft addressing CVE-2024-43573 as soon as they become available. Until patches are released, specific mitigations include disabling or restricting the use of legacy MSHTML components and Internet Explorer mode in browsers where feasible. Implementing strict Content Security Policies (CSP) can help limit the execution of unauthorized scripts. Employing web filtering solutions to block access to known malicious sites and educating users to recognize phishing attempts and avoid clicking suspicious links are critical. Network-level protections such as intrusion detection/prevention systems (IDS/IPS) should be tuned to detect anomalous web traffic patterns. Additionally, organizations should audit and update legacy applications that depend on MSHTML to reduce reliance on vulnerable components. Regular vulnerability scanning and penetration testing can help identify exposure to this and similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-08-14T01:08:33.544Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b5247d717aace26b39

Added to database: 10/21/2025, 7:06:29 PM

Last enriched: 10/21/2025, 7:29:03 PM

Last updated: 10/30/2025, 8:55:20 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats