Lucene search

K
kasperskyKaspersky LabKLA20123
HistoryDec 13, 2022 - 12:00 a.m.

KLA20123 Multiple vulnerabilities in Microsoft Developer Tools

2022-12-1300:00:00
Kaspersky Lab
threats.kaspersky.com
154

8.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.009 Low

EPSS

Percentile

82.5%

Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Microsoft Windows Sysmon can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in PowerShell can be exploited remotely to execute arbitrary code.
  3. A remote code execution vulnerability in .NET Framework can be exploited remotely to execute arbitrary code.

Original advisories

CVE-2022-44704

CVE-2022-41076

CVE-2022-41089

Exploitation

Public exploits exist for this vulnerability.

Related products

Microsoft-.NET-Framework

Microsoft-Visual-Studio

Microsoft-Windows

CVE list

CVE-2022-41076 critical

CVE-2022-44704 critical

CVE-2022-41089 critical

KB list

5021243

5021953

5020880

5021082

5021094

5021093

5021954

5021085

5021092

5021086

5020873

5021080

5020868

5021088

5021095

5021081

5021079

5021091

5021955

5021089

5021090

5021087

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Microsoft .NET Framework 3.5 AND 4.8.1Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2Microsoft .NET Framework 4.8.NET 7.0Windows SysmonMicrosoft .NET Framework 3.5.1Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)Microsoft .NET Framework 3.5Microsoft Visual Studio 2022 version 17.4.NET 6.0PowerShell 7.3Microsoft .NET Framework 4.6.2Microsoft .NET Framework 3.0 Service Pack 2Microsoft .NET Framework 3.5 AND 4.8Microsoft Visual Studio 2022 version 17.2PowerShell 7.2Microsoft Visual Studio 2022 version 17.0Microsoft .NET Framework 2.0 Service Pack 2Microsoft .NET Framework 3.5 AND 4.7.2.NET Core 3.1Microsoft .NET Framework 3.5 AND 4.6/4.6.2

References

8.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.009 Low

EPSS

Percentile

82.5%