9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.1 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.5%
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
CVE-2020-16937 warning
CVE-2020-16886 high
CVE-2020-16977 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
support.microsoft.com/kb/4578961
support.microsoft.com/kb/4578963
support.microsoft.com/kb/4578968
support.microsoft.com/kb/4578969
support.microsoft.com/kb/4578971
support.microsoft.com/kb/4578972
support.microsoft.com/kb/4578974
support.microsoft.com/kb/4579976
support.microsoft.com/kb/4579977
support.microsoft.com/kb/4579978
support.microsoft.com/kb/4579979
support.microsoft.com/kb/4579980
support.microsoft.com/kb/4580327
support.microsoft.com/kb/4580328
support.microsoft.com/kb/4580330
support.microsoft.com/kb/4580346
support.microsoft.com/kb/4580467
support.microsoft.com/kb/4580468
support.microsoft.com/kb/4580469
support.microsoft.com/kb/4580470
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16886
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16937
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16977
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-.NET-Framework/
threats.kaspersky.com/en/product/Microsoft-Visual-Studio/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.1 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.5%