CVE Vulnerabilities

CVE-2024-43461

User Interface (UI) Misrepresentation of Critical Information

Published: Sep 10, 2024 | Modified: Oct 28, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Windows MSHTML Platform Spoofing Vulnerability

Weakness

The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks.

Affected Software

NameVendorStart VersionEnd Version
Windows_10_1507Microsoft*10.0.10240.20766 (excluding)
Windows_10_1607Microsoft*10.0.14393.7336 (excluding)
Windows_10_1809Microsoft*10.0.17763.6293 (excluding)
Windows_10_21h2Microsoft*10.0.19044.4894 (excluding)
Windows_10_22h2Microsoft*10.0.19045.4894 (excluding)
Windows_11_21h2Microsoft*10.0.22000.3197 (excluding)
Windows_11_22h2Microsoft*10.0.22621.4169 (excluding)
Windows_11_23h2Microsoft*10.0.22621.4169 (excluding)
Windows_11_23h2Microsoft*10.0.22631.4169 (excluding)
Windows_11_24h2Microsoft*10.0.26100.1742 (excluding)
Windows_server_2008Microsoft–sp2 (including)–sp2 (including)
Windows_server_2008Microsoftr2 (including)r2 (including)
Windows_server_2012Microsoft- (including)- (including)
Windows_server_2012Microsoftr2 (including)r2 (including)
Windows_server_2016Microsoft*10.0.14393.7336 (excluding)
Windows_server_2019Microsoft*10.0.17763.6293 (excluding)
Windows_server_2022Microsoft*10.0.20348.2700 (excluding)
Windows_server_2022_23h2Microsoft*10.0.25398.1128 (excluding)

Extended Description

If an attacker can cause the UI to display erroneous data, or to otherwise convince the user to display information that appears to come from a trusted source, then the attacker could trick the user into performing the wrong action. This is often a component in phishing attacks, but other kinds of problems exist. For example, if the UI is used to monitor the security state of a system or network, then omitting or obscuring an important indicator could prevent the user from detecting and reacting to a security-critical event. UI misrepresentation can take many forms:

Potential Mitigations

References