Patch
CVE-2024-43573
with vRx
❗ CVE-2024-43572 is a vulnerability affecting Microsoft Management Console (MMC) when Author Mode is enabled. This vulnerability allows attackers to create malicious .msc (Microsoft Saved Console) files that execute arbitrary code on the target system. These files, when opened in Author Mode, can bypass security measures and execute unauthorized commands.
ℹ️ This detection script identifies potential risks by performing the following checks:
Registry Path Creation:
Ensures the registry path HKLM:\Software\Policies\Microsoft\MMC exists.
Creates the path if it is missing to enable configuration changes.
Modify Author Mode Configuration:
Sets the RestrictAuthorMode registry value to 1, disabling MMC Author Mode.
This change prevents MMC from running in Author Mode, mitigating the risk of executing malicious .msc files.
Confirmation Output:
Outputs a message confirming that untrusted .msc files are now restricted from being executed.
✅ By running this mitigation script, you can significantly reduce the risk of unauthorized code execution through malicious .msc files, protecting your system from CVE-2024-43572.
Read more
Read less
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Remediate faster with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.