CVE-2024-21372

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected Windows systems through malicious OLE objects. It affects Windows systems with OLE functionality enabled, primarily impacting users who open untrusted documents or visit malicious websites.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with OLE functionality enabled are vulnerable. OLE is enabled by default in most Windows installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, data exfiltration, ransomware deployment, and lateral movement across networks.

🟠

Likely Case

Malware installation, credential theft, and persistence establishment on individual workstations.

🟢

If Mitigated

Limited impact due to application sandboxing, reduced privileges, and network segmentation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious document or visiting malicious site). No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: February 2024 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21372

Restart Required: Yes

Instructions:

1. Apply February 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Disable OLE Package Execution

windows

Prevents OLE packages from executing, reducing attack surface

reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d ".zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.inf;.chm;.msi;.reg;.js;.vbs;.wsf;.wsh;.jse;.vbe;.hta;.pdf;.gif;.png;.jpg;.zip;.rar;.htm;.html;.xml;.xsl;.mht;.mhtml;.url;.lnk;.js;.jse;.vbs;.vbe;.wsf;.wsh;.ps1;.ps1xml;.ps2;.ps2xml;.psc1;.psc2;.msh;.msh1;.msh2;.mshxml;.msh1xml;.msh2xml;.scf;.scr;.sct;.shb;.shs;.pif;.cpl;.application;.gadget;.msp;.msi;.mst;.idq;.ida;.idc;.shtm;.shtml;.stm;.printer;.pcd;.htw;.htr;.idc;.htt;.htx;.asp;.aspx;.cer;.asa;.asax;.ascx;.ashx;.asmx;.axd;.cs;.csproj;.vb;.vbproj;.config;.master;.sitemap;.skin;.browser;.webinfo;.licx;.resx;.resources;.mdb;.mde;.mdf;.ldf;.adp;.ade;.accdb;.accde;.accdt;.accdr;.mam;.maq;.mar;.mas;.mat;.mau;.mav;.maw;.mda;.mdb;.mde;.mdt;.mdw;.mdz;.mpp;.mpt;.mpd;" /f

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized executables
  • Use network segmentation to isolate vulnerable systems and restrict lateral movement

🔍 How to Verify

Check if Vulnerable:

Check if February 2024 security updates are installed via Windows Update or systeminfo command

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify KB5034765 (or later) is installed for affected Windows versions

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing OLE activation failures
  • Process creation from OLE-related executables
  • Unusual document file access patterns

Network Indicators:

  • Outbound connections from Office applications to unusual destinations
  • DNS queries for malicious domains from document-related processes

SIEM Query:

source="windows" event_id=4688 process_name="cmd.exe" OR process_name="powershell.exe" parent_process_name="*office*" OR parent_process_name="*ole*"

🔗 References

📤 Share & Export