Lucene search

K
kasperskyKaspersky LabKLA11859
HistoryJul 14, 2020 - 12:00 a.m.

KLA11859 Multiple vulnerabilities in Microsoft Developer Tools

2020-07-1400:00:00
Kaspersky Lab
threats.kaspersky.com
196

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.868 High

EPSS

Percentile

98.6%

Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Diagnostics Hub can be exploited remotely via specially crafted application to gain privileges.
  2. A remote code execution vulnerability in .NET Framework, SharePoint Server, and Visual Studio can be exploited remotely via specially crafted document to execute arbitrary code.
  3. A cross-site-scripting (XSS) vulnerability Azure DevOps Server can be exploited remotely via specially crafted payload to spoof user interface.
  4. An elevation of privilege vulnerability in Visual Studio and Visual Studio Code can be exploited remotely to gain privileges.
  5. A remote code execution vulnerability in Visual Studio Code ESLint Extention can be exploited remotely to execute arbitrary code.

Original advisories

CVE-2020-1393

CVE-2020-1147

CVE-2020-1326

CVE-2020-1416

CVE-2020-1481

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-.NET-Framework

Microsoft-Visual-Studio

Microsoft-Azure

CVE list

CVE-2020-1393 warning

CVE-2020-1147 high

CVE-2020-1326 warning

CVE-2020-1416 critical

CVE-2020-1481 critical

KB list

4566468

4566469

4566466

4566467

4567703

4579980

4578974

4578972

4578971

4579977

4579978

4579979

4578968

4578969

4580328

4579976

4580330

4580327

4580346

4578963

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)Microsoft .NET Framework 3.0 Service Pack 2Azure Storage ExplorerMicrosoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2Microsoft .NET Framework 4.8Microsoft .NET Framework 3.5.1Microsoft SharePoint Server 2019Microsoft .NET Framework 3.5Azure DevOps Server 2019.0.1Microsoft Visual Studio Code ESLint extensionMicrosoft Visual Studio 2019 version 16.0Microsoft .NET Framework 3.5 AND 4.7.1/4.7.2Microsoft .NET Framework 3.5 AND 4.6/4.6.1/4.6.2Microsoft SharePoint Enterprise Server 2016Azure DevOps Server 2019 Update 1Microsoft .NET Framework 2.0 Service Pack 2Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)Microsoft .NET Framework 3.5 AND 4.7.2.NET Core 2.1Visual Studio CodeMicrosoft .NET Framework 4.5.2TypeScriptMicrosoft Visual Studio 2019 version 16.6 (includes 16.0 - 16.5)Azure DevOps Server 2019 Update 1.1Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2Microsoft .NET Framework 4.6Microsoft .NET Framework 3.5 AND 4.8Microsoft SharePoint Server 2010 Service Pack 2Microsoft Visual Studio 2015 Update 3Microsoft SharePoint Enterprise Server 2013 Service Pack 1.NET Core 3.1

References

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.868 High

EPSS

Percentile

98.6%