CVE-2024-38226
📋 TL;DR
This vulnerability allows attackers to bypass security features in Microsoft Publisher, potentially enabling them to execute malicious code or gain unauthorized access. It affects users running vulnerable versions of Microsoft Publisher on Windows systems. The vulnerability is being actively exploited according to CISA's catalog.
💻 Affected Systems
- Microsoft Publisher
📦 What is this software?
Office 2019 by Microsoft
Office 2019 by Microsoft
Office Long Term Servicing Channel by Microsoft
View all CVEs affecting Office Long Term Servicing Channel →
Office Long Term Servicing Channel by Microsoft
View all CVEs affecting Office Long Term Servicing Channel →
Publisher by Microsoft
Publisher by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through arbitrary code execution with the privileges of the current user, potentially leading to data theft, ransomware deployment, or lateral movement within networks.
Likely Case
Malicious document execution leading to malware installation, credential theft, or limited system access depending on user privileges.
If Mitigated
Limited impact with proper application control policies, restricted user privileges, and network segmentation preventing lateral movement.
🎯 Exploit Status
CISA confirms active exploitation. Attack requires user to open a malicious Publisher file. No public proof-of-concept available at time of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Security updates released in July 2024 (specific KB numbers vary by product version)
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38226
Restart Required: Yes
Instructions:
1. Open Windows Update Settings. 2. Click 'Check for updates'. 3. Install all available security updates. 4. Restart computer if prompted. For enterprise deployments, use Microsoft Update Catalog or WSUS.
🔧 Temporary Workarounds
Disable Publisher file opening
windowsBlock Publisher (.pub) files from opening via Group Policy or registry settings
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d ".zip;.rar;.cab;.msi;.msp;.msu;.msp;.msu;.exe;.com;.bat;.cmd;.vbs;.vbe;.js;.jse;.wsf;.wsh;.ps1;.ps1xml;.ps2;.ps2xml;.psc1;.psc2;.msh;.msh1;.msh2;.mshxml;.msh1xml;.msh2xml;.scf;.lnk;.inf;.reg;.pub" /f
🧯 If You Can't Patch
- Implement application control policies to block Publisher execution entirely
- Use email filtering to block Publisher attachments and educate users about document risks
🔍 How to Verify
Check if Vulnerable:
Check Publisher version via File > Account > About Publisher. Vulnerable if version is older than July 2024 updates.
Check Version:
wmic product where "name like 'Microsoft Publisher%'" get version
Verify Fix Applied:
Verify Windows Update history contains July 2024 security updates for Microsoft Publisher or Office.
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs: Application crashes, suspicious Publisher process behavior, unexpected child processes from Publisher
Network Indicators:
- Outbound connections from Publisher process to suspicious IPs, DNS requests for known malicious domains
SIEM Query:
EventID=1 OR EventID=4688 | where ParentImage contains "publisher.exe" OR Image contains "publisher.exe" | where CommandLine contains suspicious patterns