Lucene search

K
kasperskyKaspersky LabKLA60561
HistorySep 12, 2023 - 12:00 a.m.

KLA60561 Multiple vulnerabilities in Microsoft Developer Tools

2023-09-1200:00:00
Kaspersky Lab
threats.kaspersky.com
86
microsoft developer tools
malicious users
arbitrary code
gain privileges
denial of service
visual studio 2017
visual studio 2022
.net 6.0
.net framework 4.8
azure devops server
visual studio code
security update
ace
.net framework
cve-2023-36793
cve-2023-36796
cve-2023-36788
cve-2023-36742
cve-2023-36792

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.021 Low

EPSS

Percentile

89.2%

Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, cause denial of service.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Visual Studio can be exploited remotely to execute arbitrary code.
  2. A remote code execution vulnerability in .NET Framework can be exploited remotely to execute arbitrary code.
  3. A remote code execution vulnerability in Visual Studio Code can be exploited remotely to execute arbitrary code.
  4. A remote code execution vulnerability can be exploited remotely to execute arbitrary code.
  5. A remote code execution vulnerability in Azure DevOps Server can be exploited remotely to gain privileges.
  6. A remote code execution vulnerability in Azure DevOps Server can be exploited remotely to execute arbitrary code.
  7. An elevation of privilege vulnerability in Visual Studio can be exploited remotely to gain privileges.
  8. A denial of service vulnerability in .NET Core and Visual Studio can be exploited remotely to cause denial of service.

Original advisories

CVE-2023-36793

CVE-2023-36796

CVE-2023-36788

CVE-2023-36742

CVE-2023-36792

CVE-2023-39956

CVE-2023-38155

CVE-2023-33136

CVE-2023-36759

CVE-2023-36799

CVE-2023-36794

CVE-2023-36758

Related products

Microsoft-.NET-Framework

Microsoft-Visual-Studio

Microsoft-Azure

.NET

CVE list

CVE-2023-39956 high

CVE-2023-36793 critical

CVE-2023-36796 critical

CVE-2023-36788 critical

CVE-2023-36742 critical

CVE-2023-36792 critical

CVE-2023-38155 critical

CVE-2023-33136 critical

CVE-2023-36759 high

CVE-2023-36799 high

CVE-2023-36794 critical

CVE-2023-36758 critical

KB list

5030184

5030179

5029924

5030180

5030183

5030181

5030185

5030182

5030186

5030178

5030213

5030220

5031217

5029366

5029365

5032875

5032874

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)Microsoft Visual Studio 2022 version 17.4Microsoft Visual Studio 2022 version 17.7.NET 6.0Microsoft .NET Framework 4.8Azure DevOps Server 2020.1.2Microsoft .NET Framework 3.5Microsoft .NET Framework 3.5 AND 4.8Azure DevOps Server 2019.0.1Microsoft .NET Framework 3.5 AND 4.8.1Microsoft .NET Framework 2.0 Service Pack 2Azure DevOps Server 2019.1.2Visual Studio CodeMicrosoft .NET Framework 3.5 AND 4.7.2Microsoft .NET Framework 3.0 Service Pack 2Microsoft .NET Framework 4.6.2Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)Microsoft Visual Studio 2022 version 17.6.NET 7.0Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2Microsoft Visual Studio 2022 version 17.2Azure DevOps Server 2020.0.2Microsoft .NET Framework 3.5.1

References

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.021 Low

EPSS

Percentile

89.2%