CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
88.7%
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, gain privileges.
Below is a complete list of vulnerabilities:
CVE-2020-1597 critical
CVE-2020-1046 critical
CVE-2020-0604 critical
CVE-2020-1476 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4569745
support.microsoft.com/kb/4569746
support.microsoft.com/kb/4569748
support.microsoft.com/kb/4569749
support.microsoft.com/kb/4569751
support.microsoft.com/kb/4570500
support.microsoft.com/kb/4570501
support.microsoft.com/kb/4570502
support.microsoft.com/kb/4570503
support.microsoft.com/kb/4570505
support.microsoft.com/kb/4570506
support.microsoft.com/kb/4570507
support.microsoft.com/kb/4570508
support.microsoft.com/kb/4570509
support.microsoft.com/kb/4571692
support.microsoft.com/kb/4571694
support.microsoft.com/kb/4571709
support.microsoft.com/kb/4571741
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0604
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1046
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1476
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1597
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-.NET-Framework/
threats.kaspersky.com/en/product/Microsoft-Visual-Studio/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
88.7%