7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.2 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
59.0%
**Applies to:**All Visual Studio 2015 Update 3 editions except Integrated Shell and Build Tools.
A remote code execution vulnerability exists in Microsoft Visual Studio 2015 when it incorrectly handles debug information.To learn more about the vulnerability, see CVE-2023-21808, CVE-2023-23381, CVE-2023-24897, and CVE-2023-21815.
The following file is available for download: Download the hotfix package now.
To get the standalone package for this update, go to the Microsoft Update Catalog website.
To apply this security update, you must have Visual Studio 2015 Update 3 installed.
We recommend that you close Visual Studio 2015 before you install this security update. Otherwise, you may have to restart the computer after you apply this security update if a file that is being updated is open or in use by Visual Studio.
This security update doesnβt replace other security updates.
File name | SHA256 hash |
---|---|
vs14-kb5025792.exe | F2E3D08C86B769644C9CBDA08F5617BCBEBB4FEEF43B752DD37DAC2CE8395C2E |
File name | File version | File size | Date | Time |
---|---|---|---|---|
vs14-kb5025792.exe | 14.0.27555.0 | 11,142,464 | June β8, β2023 | 9:50:30 PM |
To verify that this security update is applied correctly, follow these steps:
Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.2 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
59.0%