CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
65.6%
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to gain privileges, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
CVE-2020-1293 warning
CVE-2020-1202 high
CVE-2020-1203 high
CVE-2020-1257 warning
CVE-2020-1278 warning
CVE-2020-1327 warning
CVE-2020-1343 warning
CVE-2020-1340 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4562053
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1202
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1203
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1257
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1278
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1293
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1327
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1340
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1343
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-Azure/
threats.kaspersky.com/en/product/Microsoft-Visual-Studio/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
65.6%