Lucene search

K
cve[email protected]CVE-2023-28260
HistoryApr 11, 2023 - 9:15 p.m.

CVE-2023-28260

2023-04-1121:15:25
web.nvd.nist.gov
254
.net
dll hijacking
remote code execution
vulnerability
cve-2023-28260
nvd

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.6%

.NET DLL Hijacking Remote Code Execution Vulnerability

Affected configurations

Vulners
NVD
Node
microsoft.net_6.0Range6.0.06.0.16
OR
microsoft.net_7.0Range7.0.07.0.5
OR
microsoftmicrosoft_visual_studio_2022_17.5Range17.5.017.5.4
OR
microsoftmicrosoft_visual_studio_2022_17.4Range17.4.017.4.7
OR
microsoftmicrosoft_visual_studio_2022_17.2Range17.2.017.2.15
OR
microsoftmicrosoft_visual_studio_2022_17.0Range17.0.017.0.21
OR
microsoftpowershell_7.3Range7.3.07.3.4
OR
microsoftpowershell_7.2Range7.2.07.2.11
VendorProductVersionCPE
microsoft.net_6.0*cpe:2.3:a:microsoft:.net_6.0:*:*:*:*:*:*:*:*
microsoft.net_7.0*cpe:2.3:a:microsoft:.net_7.0:*:*:*:*:*:*:*:*
microsoftmicrosoft_visual_studio_2022_17.5*cpe:2.3:a:microsoft:microsoft_visual_studio_2022_17.5:*:*:*:*:*:*:*:*
microsoftmicrosoft_visual_studio_2022_17.4*cpe:2.3:a:microsoft:microsoft_visual_studio_2022_17.4:*:*:*:*:*:*:*:*
microsoftmicrosoft_visual_studio_2022_17.2*cpe:2.3:a:microsoft:microsoft_visual_studio_2022_17.2:*:*:*:*:*:*:*:*
microsoftmicrosoft_visual_studio_2022_17.0*cpe:2.3:a:microsoft:microsoft_visual_studio_2022_17.0:*:*:*:*:*:*:*:*
microsoftpowershell_7.3*cpe:2.3:a:microsoft:powershell_7.3:*:*:*:*:*:*:*:*
microsoftpowershell_7.2*cpe:2.3:a:microsoft:powershell_7.2:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Microsoft",
    "product": ".NET 6.0",
    "cpes": [
      "cpe:2.3:a:microsoft:.net:6.0.0:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "6.0.0",
        "lessThan": "6.0.16",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": ".NET 7.0",
    "cpes": [
      "cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "7.0.0",
        "lessThan": "7.0.5",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft Visual Studio 2022 version 17.5",
    "cpes": [
      "cpe:2.3:a:microsoft:visual_studio:2022:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "17.5.0",
        "lessThan": "17.5.4",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft Visual Studio 2022 version 17.4",
    "cpes": [
      "cpe:2.3:a:microsoft:visual_studio_2022:17.4:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "17.4.0",
        "lessThan": "17.4.7",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft Visual Studio 2022 version 17.2",
    "cpes": [
      "cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "17.2.0",
        "lessThan": "17.2.15",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft Visual Studio 2022 version 17.0",
    "cpes": [
      "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "17.0.0",
        "lessThan": "17.0.21",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "PowerShell 7.3",
    "cpes": [
      "cpe:2.3:a:microsoft:powershell:7.3:-:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "7.3.0",
        "lessThan": "7.3.4",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "PowerShell 7.2",
    "cpes": [
      "cpe:2.3:a:microsoft:powershell:7.2:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "7.2.0",
        "lessThan": "7.2.11",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  }
]

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.6%