9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.868 High
EPSS
Percentile
98.6%
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2020-1393 warning
CVE-2020-1147 high
CVE-2020-1326 warning
CVE-2020-1416 critical
CVE-2020-1481 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4566466
support.microsoft.com/kb/4566467
support.microsoft.com/kb/4566468
support.microsoft.com/kb/4566469
support.microsoft.com/kb/4567703
support.microsoft.com/kb/4578963
support.microsoft.com/kb/4578968
support.microsoft.com/kb/4578969
support.microsoft.com/kb/4578971
support.microsoft.com/kb/4578972
support.microsoft.com/kb/4578974
support.microsoft.com/kb/4579976
support.microsoft.com/kb/4579977
support.microsoft.com/kb/4579978
support.microsoft.com/kb/4579979
support.microsoft.com/kb/4579980
support.microsoft.com/kb/4580327
support.microsoft.com/kb/4580328
support.microsoft.com/kb/4580330
support.microsoft.com/kb/4580346
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1147
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1326
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1393
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1416
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1481
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-.NET-Framework/
threats.kaspersky.com/en/product/Microsoft-Azure/
threats.kaspersky.com/en/product/Microsoft-Visual-Studio/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.868 High
EPSS
Percentile
98.6%