By zerosday cve bot•September 16, 2024•
cves
CVE-2024-43461: Microsoft Windows MSHTML Platform Spoofing Vulnerability (Pentest Lab Guide)

CVE-2024-43461: Technical Deep-Dive (Auto Refreshed)
Generated on 2026-03-21T05:04:43.486Z. This file is automatically regenerated every 30 minutes by the CVE AI enrichment job using web sources (NVD, MITRE, CISA KEV, GitHub).
Executive Technical Summary
Windows MSHTML Platform Spoofing Vulnerability
- Context preserved from previous revision: Windows MSHTML Platform Spoofing Vulnerability 1. Use only isolated environments and systems you own or are explicitly authorized to test.
Technical Details
- CVE: CVE-2024-43461
- KEV date added: 2024-09-16
- KEV due date: 2024-10-07
- NVD published: 2024-09-10
- NVD modified: 2025-10-28
- MITRE modified: 2025-12-30
- CVSS base score: 8.8
- CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- CVSS exploitability score: 2.8
- CVSS impact score: 5.9
- Attack vector: Network
- Attack complexity: Low
- Privileges required: None
- User interaction: Required
- Scope: Unchanged
- Confidentiality impact: High
- Integrity impact: High
- Availability impact: High
Versions and Products Impacted
- microsoft / windows 10 1507 (versions: < 10.0.10240.20766)
- microsoft / windows 10 1607 (versions: < 10.0.14393.7336)
- microsoft / windows 10 1809 (versions: < 10.0.17763.6293)
- microsoft / windows 10 21h2 (versions: < 10.0.19044.4894)
- microsoft / windows 10 22h2 (versions: < 10.0.19045.4894)
- microsoft / windows 11 21h2 (versions: < 10.0.22000.3197)
- microsoft / windows 11 22h2 (versions: < 10.0.22621.4169)
- microsoft / windows 11 23h2 (versions: < 10.0.22621.4169)
- microsoft / windows 11 23h2 (versions: < 10.0.22631.4169)
- microsoft / windows 11 24h2 (versions: < 10.0.26100.1742)
- microsoft / windows server 2008
- microsoft / windows server 2008 (versions: r2)
- microsoft / windows server 2012
- microsoft / windows server 2012 (versions: r2)
- microsoft / windows server 2016 (versions: < 10.0.14393.7336)
- microsoft / windows server 2019 (versions: < 10.0.17763.6293)
- microsoft / windows server 2022 (versions: < 10.0.20348.2700)
- microsoft / windows server 2022 23h2 (versions: < 10.0.25398.1128)
- Microsoft / Windows 11 Version 24H2 (versions: 10.0.26100.0)
- Microsoft / Windows 10 Version 1809 (versions: 10.0.17763.0)
Weakness Classification
- CWE-451
- NVD-CWE-Other
Repositories for Lab Validation (Public Examples)
- 0xcrypto/apple-cves | stars: 0 | updated: 2026-03-15 | https://github.com/0xcrypto/apple-cves
People and Organizations Mentioned
- microsoft
- Windows
- 0xcrypto
Practical Defensive Validation (Authorized Only)
- Use only isolated environments and systems you own or are explicitly authorized to test.
- Snapshot infrastructure before validation and preserve baseline logs (EDR, SIEM, OS, app).
- Inventory microsoft / windows 10 1507 (versions: < 10.0.10240.20766) assets and confirm exact vulnerable versions with automated checks.
- Patch in staged environments and validate closure with scanners + service health checks.
- Map detections to MITRE ATT&CK tactics relevant to your environment and tune alert quality.
References
- NVD record: https://nvd.nist.gov/vuln/detail/CVE-2024-43461
- MITRE CVE record: https://www.cve.org/CVERecord?id=CVE-2024-43461
- CISA KEV Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- CISA KEV JSON feed: https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
- KEV notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43461
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-43461
- Repository example: https://github.com/0xcrypto/apple-cves
This content is for defensive security training and authorized validation only.
