CVE-2024-38226

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass security features in Microsoft Publisher, potentially enabling them to execute malicious code or gain unauthorized access. It affects users running vulnerable versions of Microsoft Publisher on Windows systems. The vulnerability is being actively exploited according to CISA's catalog.

💻 Affected Systems

Products:
  • Microsoft Publisher
Versions: Microsoft Publisher 2016, 2019, 2021, and Microsoft 365 Apps for Enterprise
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both 32-bit and 64-bit versions. Microsoft 365 Apps for Enterprise users receive automatic updates.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary code execution with the privileges of the current user, potentially leading to data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Malicious document execution leading to malware installation, credential theft, or limited system access depending on user privileges.

🟢

If Mitigated

Limited impact with proper application control policies, restricted user privileges, and network segmentation preventing lateral movement.

🌐 Internet-Facing: MEDIUM - While Publisher files might be delivered via email or web, exploitation typically requires user interaction to open malicious documents.
🏢 Internal Only: HIGH - Internal users opening malicious Publisher documents from phishing emails or compromised shares could lead to significant organizational impact.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

CISA confirms active exploitation. Attack requires user to open a malicious Publisher file. No public proof-of-concept available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates released in July 2024 (specific KB numbers vary by product version)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38226

Restart Required: Yes

Instructions:

1. Open Windows Update Settings. 2. Click 'Check for updates'. 3. Install all available security updates. 4. Restart computer if prompted. For enterprise deployments, use Microsoft Update Catalog or WSUS.

🔧 Temporary Workarounds

Disable Publisher file opening

windows

Block Publisher (.pub) files from opening via Group Policy or registry settings

reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d ".zip;.rar;.cab;.msi;.msp;.msu;.msp;.msu;.exe;.com;.bat;.cmd;.vbs;.vbe;.js;.jse;.wsf;.wsh;.ps1;.ps1xml;.ps2;.ps2xml;.psc1;.psc2;.msh;.msh1;.msh2;.mshxml;.msh1xml;.msh2xml;.scf;.lnk;.inf;.reg;.pub" /f

🧯 If You Can't Patch

  • Implement application control policies to block Publisher execution entirely
  • Use email filtering to block Publisher attachments and educate users about document risks

🔍 How to Verify

Check if Vulnerable:

Check Publisher version via File > Account > About Publisher. Vulnerable if version is older than July 2024 updates.

Check Version:

wmic product where "name like 'Microsoft Publisher%'" get version

Verify Fix Applied:

Verify Windows Update history contains July 2024 security updates for Microsoft Publisher or Office.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Application crashes, suspicious Publisher process behavior, unexpected child processes from Publisher

Network Indicators:

  • Outbound connections from Publisher process to suspicious IPs, DNS requests for known malicious domains

SIEM Query:

EventID=1 OR EventID=4688 | where ParentImage contains "publisher.exe" OR Image contains "publisher.exe" | where CommandLine contains suspicious patterns

🔗 References

📤 Share & Export