Lucene search

K
kasperskyKaspersky LabKLA11956
HistorySep 08, 2020 - 12:00 a.m.

KLA11956 Multiple vulnerabilities in Microsoft Developer Tools

2020-09-0800:00:00
Kaspersky Lab
threats.kaspersky.com
56
microsoft developer tools
vulnerabilities
privileges
arbitrary code execution
security bypass
asp.net core
visual studio
windows defender
remote exploitation

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.4

Confidence

High

EPSS

0.012

Percentile

85.1%

Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Diagnostics Hub Standard Collector can be exploited remotely via specially crafted application to gain privileges.
  2. A remote code execution vulnerability in Visual Studio can be exploited remotely via specially crafted file to execute arbitrary code.
  3. A remote code execution vulnerability in Visual Studio JSON can be exploited remotely to execute arbitrary code.
  4. A security feature bypass vulnerability in Microsoft ASP.NET Core can be exploited remotely to bypass security restrictions.
  5. A security feature bypass vulnerability in Windows Defender Application Control can be exploited remotely to bypass security restrictions.

Original advisories

CVE-2020-1130

CVE-2020-1133

CVE-2020-16874

CVE-2020-16881

CVE-2020-1045

CVE-2020-16856

CVE-2020-0951

Related products

Microsoft-Visual-Studio

CVE list

CVE-2020-1130 high

CVE-2020-0951 high

CVE-2020-1133 high

CVE-2020-16874 critical

CVE-2020-16881 critical

CVE-2020-1045 critical

CVE-2020-16856 critical

KB list

4576950

4571480

4571481

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • ASP.NET Core 3.1Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)Microsoft Visual Studio 2019 version 16.0Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)Visual Studio CodeASP.NET Core 2.1Microsoft Visual Studio 2013 Update 5Microsoft Visual Studio 2012 Update 5Microsoft Visual Studio 2015 Update 3PowerShell 7.1PowerShell 7.0Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.4

Confidence

High

EPSS

0.012

Percentile

85.1%