10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.4 High
AI Score
Confidence
High
0.373 Low
EPSS
Percentile
97.2%
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
CVE-2018-8269 warning
CVE-2018-8479 high
CVE-2018-8409 warning
CVE-2018-8421 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4457025
support.microsoft.com/kb/4457026
support.microsoft.com/kb/4457027
support.microsoft.com/kb/4457028
support.microsoft.com/kb/4457029
support.microsoft.com/kb/4457030
support.microsoft.com/kb/4457033
support.microsoft.com/kb/4457034
support.microsoft.com/kb/4457035
support.microsoft.com/kb/4457036
support.microsoft.com/kb/4457037
support.microsoft.com/kb/4457038
support.microsoft.com/kb/4457042
support.microsoft.com/kb/4457043
support.microsoft.com/kb/4457044
support.microsoft.com/kb/4457045
support.microsoft.com/kb/4457053
support.microsoft.com/kb/4457054
support.microsoft.com/kb/4457055
support.microsoft.com/kb/4457056
support.microsoft.com/kb/4457128
support.microsoft.com/kb/4457131
support.microsoft.com/kb/4457132
support.microsoft.com/kb/4457138
support.microsoft.com/kb/4457142
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8269
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8409
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8421
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8479
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-.NET-Framework/
threats.kaspersky.com/en/product/Microsoft-Azure/
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.4 High
AI Score
Confidence
High
0.373 Low
EPSS
Percentile
97.2%