{"uuid": "410acb28-4c80-407f-b3ee-23c98f01fc1a", "vulnerability": {"vulnId": "CVE-2024-21351", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "410acb28-4c80-407f-b3ee-23c98f01fc1a"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2024-02-13T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2024-02-13T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2024-02-13T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Windows SmartScreen Security Feature Bypass Vulnerability | Affected: Microsoft / Windows | Description: Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience and inject code to potentially gain code execution, which could lead to some data exposure, lack of system availability, or both. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Due date: 2024-03-05 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21351; https://nvd.nist.gov/vuln/detail/CVE-2024-21351"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-94"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Windows", "due_date": "2024-03-05", "date_added": "2024-02-13", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-21351", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-21351"}]}
