Lucene search

K
kasperskyKaspersky LabKLA12505
HistoryApr 12, 2022 - 12:00 a.m.

KLA12505 Multiple vulnerabilities in Microsoft Developer Tools

2022-04-1200:00:00
Kaspersky Lab
threats.kaspersky.com
44

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.6%

Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Visual Studio can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in Window Visual Studio can be exploited remotely to execute arbitrary code.
  3. A denial of service vulnerability in .NET Framework can be exploited remotely to cause denial of service.
  4. An elevation of privilege vulnerability in Visual Studio Code can be exploited remotely to gain privileges.
  5. A denial of service vulnerability in YARP can be exploited remotely to cause denial of service.
  6. An elevation of privilege vulnerability in PowerShell can be exploited remotely to gain privileges.

Original advisories

CVE-2022-24513

CVE-2022-24767

CVE-2022-26832

CVE-2022-26921

CVE-2022-24765

CVE-2022-26924

CVE-2022-26788

Related products

Microsoft-.NET-Framework

Microsoft-Visual-Studio

CVE list

CVE-2022-26788 critical

CVE-2022-24513 critical

CVE-2022-24767 critical

CVE-2022-26832 critical

CVE-2022-26921 high

CVE-2022-24765 critical

CVE-2022-26924 critical

KB list

5012596

5012117

5012326

5012332

5012327

5012331

5012329

5012324

5012328

5012325

5012123

5012121

5012120

5012118

5012330

5016568

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Microsoft .NET Framework 4.5.2Microsoft .NET Framework 4.8Microsoft .NET Framework 3.5 AND 4.8Microsoft .NET Framework 3.5 AND 4.7.2PowerShell 7.1PowerShell 7.0PowerShell 7.2YARP 1.0YARP 1.1RC

References

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.6%