Lucene search

K
kasperskyKaspersky LabKLA20235
HistoryFeb 14, 2023 - 12:00 a.m.

KLA20235 Multiple vulnerabilities in Microsoft Developer Tools

2023-02-1400:00:00
Kaspersky Lab
threats.kaspersky.com
74

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.014 Low

EPSS

Percentile

86.3%

Detect date:

02/14/2023

Severity:

Critical

Description:

Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, cause denial of service.

Exploitation:

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Affected products:

Microsoft .NET Framework 4.6.2
Microsoft .NET Framework 3.5 AND 4.8
Microsoft .NET Framework 3.5
Microsoft Visual Studio 2022 version 17.4
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 3.5 AND 4.7.2
Microsoft .NET Framework 2.0 Service Pack 2
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2
Microsoft .NET Framework 4.8
Microsoft .NET Framework 3.0 Service Pack 2
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
Microsoft .NET Framework 3.5 AND 4.8.1
Azure DevOps Server 2020.1.2
Microsoft Visual Studio 2022 version 17.0
Microsoft .NET Framework 3.5 and 4.6.2
Microsoft Visual Studio 2022 version 17.2
SQL Server Integration Services for Visual Studio 2019
SQL Server Integration Services for Visual Studio 2022
.NET 7.0
.NET 6.0
PowerShell 7.2

Solution:

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories:

CVE-2023-21815
CVE-2023-21553
CVE-2023-21566
CVE-2023-21722
CVE-2023-23381
CVE-2023-21567
CVE-2023-41953
CVE-2023-21568
CVE-2023-21808
CVE-2022-23521

Impacts:

ACE

Related products:

Microsoft .NET Framework

CVE-IDS:

CVE-2022-235219.8Critical
CVE-2023-215687.3High
CVE-2023-218157.8Critical
CVE-2023-215537.5Critical
CVE-2023-215667.8Critical
CVE-2023-217225.0Warning
CVE-2023-233817.8Critical
CVE-2023-215675.6High
CVE-2023-218087.8Critical

KB list:

5022838
5022858
5023286
5022782
5022734
5022733
5022728
5022783
5022731
5022732
5022784
5022727
5022729
5022503
5022786
5023288
5022785
5022497
5022730
5022735
5025792
5026610

Microsoft official advisories:

References

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.014 Low

EPSS

Percentile

86.3%