7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.106 Low
EPSS
Percentile
94.9%
04/13/2021
High
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, spoof user interface.
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows Server, version 1909 (Server Core installation)
Windows 10 Version 2004 for x64-based Systems
Azure DevOps Server 2019 Update 1
Team Foundation Server 2017 Update 3.1
Azure DevOps Server 2020.0.1
Visual Studio Code
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 â 16.6)
Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)
Windows Server 2019
Windows 10 Version 1909 for 32-bit Systems
Visual Studio Code - GitHub Pull Requests and Issues Extension
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
Windows 10 Version 1909 for x64-based Systems
Microsoft Visual Studio 2015 Update 3
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows Server 2019 (Server Core installation)
Team Foundation Server 2018 Update 3.2
Azure DevOps Server 2019 Update 1.1
Windows Server, version 2004 (Server Core installation)
Azure DevOps Server 2020
Windows 10 Version 20H2 for ARM64-based Systems
Azure DevOps Server 2019.0.1
Windows 10 Version 1803 for x64-based Systems
Team Foundation Server 2015 Update 4.2
Windows 10 Version 1803 for 32-bit Systems
Visual Studio Code - Maven for Java Extension
Windows 10 Version 1809 for 32-bit Systems
Windows Server, version 20H2 (Server Core Installation)
Team Foundation Server 2018 Update 1.2
Windows 10 Version 20H2 for x64-based Systems
Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2021-28470
CVE-2021-28469
CVE-2021-28321
CVE-2021-27067
CVE-2021-28313
CVE-2021-28473
CVE-2021-28477
CVE-2021-28457
CVE-2021-28475
CVE-2021-28322
CVE-2021-28471
CVE-2021-28459
CVE-2021-28472
CVE-2021-27064
ACE
CVE-2021-283227.8Critical
CVE-2021-283137.8Critical
CVE-2021-283217.8Critical
CVE-2021-284707.8Critical
CVE-2021-284697.8Critical
CVE-2021-270676.5High
CVE-2021-284737.8Critical
CVE-2021-284777.0High
CVE-2021-284577.8Critical
CVE-2021-284757.8Critical
CVE-2021-284717.8Critical
CVE-2021-284596.1High
CVE-2021-284727.8Critical
CVE-2021-270647.8Critical
support.microsoft.com/kb/5001292
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-27064
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-27067
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28313
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28321
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28322
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28457
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28459
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28469
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28470
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28471
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28472
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28473
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28475
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28477
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27064
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27067
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28313
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28321
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28322
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28457
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28459
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28469
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28470
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28471
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28472
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28473
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28475
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28477
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Microsoft-Azure/
threats.kaspersky.com/en/product/Microsoft-Visual-Studio/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Team-Foundation-Server/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.106 Low
EPSS
Percentile
94.9%