CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
87.0%
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, spoof user interface.
Below is a complete list of vulnerabilities:
CVE-2021-28322 critical
CVE-2021-28313 critical
CVE-2021-28321 critical
CVE-2021-28470 critical
CVE-2021-28469 critical
CVE-2021-27067 high
CVE-2021-28473 critical
CVE-2021-28477 high
CVE-2021-28457 critical
CVE-2021-28475 critical
CVE-2021-28471 critical
CVE-2021-28459 high
CVE-2021-28472 critical
CVE-2021-27064 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/5001292
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-27064
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-27067
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28313
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28321
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28322
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28457
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28459
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28469
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28470
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28471
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28472
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28473
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28475
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28477
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-Azure/
threats.kaspersky.com/en/product/Microsoft-Visual-Studio/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Team-Foundation-Server/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
87.0%