Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5924: CWE-693: Protection Mechanism Failure in Dropbox Dropbox Desktop

0
High
VulnerabilityCVE-2024-5924cvecve-2024-5924cwe-693
Published: Thu Jun 13 2024 (06/13/2024, 19:40:13 UTC)
Source: CVE Database V5
Vendor/Project: Dropbox
Product: Dropbox Desktop

Description

Dropbox Desktop Folder Sharing Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of Dropbox Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of shared folders. When syncing files from a shared folder belonging to an untrusted account, the Dropbox desktop application does not apply the Mark-of-the-Web to the local files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-23991.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 00:51:56 UTC

Technical Analysis

CVE-2024-5924 is a vulnerability classified under CWE-693 (Protection Mechanism Failure) affecting Dropbox Desktop version 198.4.7615. The issue stems from improper handling of the Mark-of-the-Web (MotW) security feature, which is designed to flag files downloaded from untrusted sources to trigger security warnings or restrictions when opened. Specifically, when files are synced from a shared folder owned by an untrusted Dropbox account, the Dropbox Desktop client fails to apply the MotW attribute to these local files. This omission allows attackers to bypass security controls that rely on MotW to prevent execution of potentially malicious content. An attacker can exploit this by sharing a folder containing malicious files with a target user. When the victim syncs the folder and opens the malicious file, arbitrary code can execute with the victim’s user privileges. Exploitation requires user interaction, such as opening the file or visiting a malicious webpage that triggers the file execution. The vulnerability has a CVSS v3.0 base score of 8.8, reflecting its network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. Although no active exploits have been reported, the flaw poses a significant risk due to the widespread use of Dropbox Desktop in enterprise and personal environments. The vulnerability was assigned by the Zero Day Initiative (ZDI) and publicly disclosed on June 13, 2024.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary code on affected systems with the privileges of the logged-in user, potentially leading to full compromise of the user's environment. This can result in unauthorized access to sensitive data, installation of malware or ransomware, lateral movement within networks, and disruption of business operations. Since Dropbox Desktop is commonly used for file synchronization and collaboration, attackers can leverage shared folders as a vector to infiltrate organizations. The bypass of Mark-of-the-Web protections undermines a critical security control designed to prevent execution of untrusted content, increasing the risk of successful phishing and social engineering attacks. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments where users frequently open files from shared folders. The high CVSS score reflects the broad impact on confidentiality, integrity, and availability, making this a significant threat to organizations relying on Dropbox Desktop for file sharing.

Mitigation Recommendations

1. Immediately restrict sharing permissions on Dropbox folders to trusted accounts only, minimizing exposure to untrusted or unknown users. 2. Educate users to be cautious when opening files from shared folders, especially those received from unfamiliar sources. 3. Monitor and audit shared folder activity within Dropbox to detect unusual sharing patterns or additions from untrusted accounts. 4. Implement endpoint security solutions capable of detecting and blocking execution of suspicious files, including behavioral analysis and application whitelisting. 5. Use network-level protections such as web filtering and email security gateways to reduce the likelihood of users receiving malicious links or files. 6. Apply the official patch or update from Dropbox as soon as it is released to address this vulnerability. 7. Consider disabling automatic syncing of shared folders from untrusted accounts until the vulnerability is remediated. 8. Employ multi-factor authentication and least privilege principles to limit the impact of potential compromise. 9. Regularly back up critical data to enable recovery in case of compromise. 10. Stay informed through vendor advisories and threat intelligence feeds for any emerging exploit activity related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-06-12T19:05:13.638Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6bf6b7ef31ef0b55d184

Added to database: 2/25/2026, 9:39:02 PM

Last enriched: 2/28/2026, 12:51:56 AM

Last updated: 4/11/2026, 3:32:57 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses