9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.4 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.014 Low
EPSS
Percentile
86.3%
02/14/2023
Critical
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, cause denial of service.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Microsoft .NET Framework 4.6.2
Microsoft .NET Framework 3.5 AND 4.8
Microsoft .NET Framework 3.5
Microsoft Visual Studio 2022 version 17.4
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 3.5 AND 4.7.2
Microsoft .NET Framework 2.0 Service Pack 2
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2
Microsoft .NET Framework 4.8
Microsoft .NET Framework 3.0 Service Pack 2
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
Microsoft .NET Framework 3.5 AND 4.8.1
Azure DevOps Server 2020.1.2
Microsoft Visual Studio 2022 version 17.0
Microsoft .NET Framework 3.5 and 4.6.2
Microsoft Visual Studio 2022 version 17.2
SQL Server Integration Services for Visual Studio 2019
SQL Server Integration Services for Visual Studio 2022
.NET 7.0
.NET 6.0
PowerShell 7.2
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2023-21815
CVE-2023-21553
CVE-2023-21566
CVE-2023-21722
CVE-2023-23381
CVE-2023-21567
CVE-2023-41953
CVE-2023-21568
CVE-2023-21808
CVE-2022-23521
ACE
CVE-2022-235219.8Critical
CVE-2023-215687.3High
CVE-2023-218157.8Critical
CVE-2023-215537.5Critical
CVE-2023-215667.8Critical
CVE-2023-217225.0Warning
CVE-2023-233817.8Critical
CVE-2023-215675.6High
CVE-2023-218087.8Critical
5022838
5022858
5023286
5022782
5022734
5022733
5022728
5022783
5022731
5022732
5022784
5022727
5022729
5022503
5022786
5023288
5022785
5022497
5022730
5022735
5025792
5026610
support.microsoft.com/kb/5022497
support.microsoft.com/kb/5022503
support.microsoft.com/kb/5022727
support.microsoft.com/kb/5022728
support.microsoft.com/kb/5022729
support.microsoft.com/kb/5022730
support.microsoft.com/kb/5022731
support.microsoft.com/kb/5022732
support.microsoft.com/kb/5022733
support.microsoft.com/kb/5022734
support.microsoft.com/kb/5022735
support.microsoft.com/kb/5022782
support.microsoft.com/kb/5022783
support.microsoft.com/kb/5022784
support.microsoft.com/kb/5022785
support.microsoft.com/kb/5022786
support.microsoft.com/kb/5022838
support.microsoft.com/kb/5022858
support.microsoft.com/kb/5023286
support.microsoft.com/kb/5023288
support.microsoft.com/kb/5025792
support.microsoft.com/kb/5026610
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21553
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21566
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21567
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21568
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21722
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21808
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23381
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23521
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21553
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21566
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21567
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21568
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21722
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21808
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21815
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23381
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41953
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-.NET-Framework/
threats.kaspersky.com/en/product/Microsoft-Azure/
threats.kaspersky.com/en/product/Microsoft-SQL-Server/
threats.kaspersky.com/en/product/Microsoft-Visual-Studio/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.4 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.014 Low
EPSS
Percentile
86.3%