logo
DATABASE RESOURCES PRICING ABOUT US

KLA12141 Multiple vulnerabilities in Microsoft Developer Tools

Description

### *Detect date*: 04/13/2021 ### *Severity*: High ### *Description*: Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, spoof user interface. ### *Affected products*: Windows 10 Version 2004 for ARM64-based Systems Windows 10 Version 1909 for ARM64-based Systems Windows Server, version 1909 (Server Core installation) Windows 10 Version 2004 for x64-based Systems Azure DevOps Server 2019 Update 1 Team Foundation Server 2017 Update 3.1 Azure DevOps Server 2020.0.1 Visual Studio Code Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3) Windows Server 2019 Windows 10 Version 1909 for 32-bit Systems Visual Studio Code - GitHub Pull Requests and Issues Extension Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Windows 10 Version 1909 for x64-based Systems Microsoft Visual Studio 2015 Update 3 Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 2004 for 32-bit Systems Windows Server 2019 (Server Core installation) Team Foundation Server 2018 Update 3.2 Azure DevOps Server 2019 Update 1.1 Windows Server, version 2004 (Server Core installation) Azure DevOps Server 2020 Windows 10 Version 20H2 for ARM64-based Systems Azure DevOps Server 2019.0.1 Windows 10 Version 1803 for x64-based Systems Team Foundation Server 2015 Update 4.2 Windows 10 Version 1803 for 32-bit Systems Visual Studio Code - Maven for Java Extension Windows 10 Version 1809 for 32-bit Systems Windows Server, version 20H2 (Server Core Installation) Team Foundation Server 2018 Update 1.2 Windows 10 Version 20H2 for x64-based Systems Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8) Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 1803 for ARM64-based Systems ### *Solution*: Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) ### *Original advisories*: [CVE-2021-28470](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28470>) [CVE-2021-28469](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28469>) [CVE-2021-28321](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28321>) [CVE-2021-27067](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-27067>) [CVE-2021-28313](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28313>) [CVE-2021-28473](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28473>) [CVE-2021-28477](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28477>) [CVE-2021-28457](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28457>) [CVE-2021-28475](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28475>) [CVE-2021-28322](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28322>) [CVE-2021-28471](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28471>) [CVE-2021-28459](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28459>) [CVE-2021-28472](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28472>) [CVE-2021-27064](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-27064>) ### *Impacts*: ACE ### *Related products*: [Microsoft Visual Studio](<https://threats.kaspersky.com/en/product/Microsoft-Visual-Studio/>) ### *CVE-IDS*: [CVE-2021-28322](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28322>)4.6Warning [CVE-2021-28313](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28313>)4.6Warning [CVE-2021-28321](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28321>)4.6Warning [CVE-2021-28470](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28470>)6.8High [CVE-2021-28469](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28469>)6.8High [CVE-2021-27067](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27067>)4.0Warning [CVE-2021-28473](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28473>)6.8High [CVE-2021-28477](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28477>)6.8High [CVE-2021-28457](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28457>)6.8High [CVE-2021-28475](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28475>)6.8High [CVE-2021-28471](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28471>)6.8High [CVE-2021-28459](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28459>)4.3Warning [CVE-2021-28472](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28472>)6.8High [CVE-2021-27064](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27064>)4.6Warning ### *KB list*: [5001292](<http://support.microsoft.com/kb/5001292>) ### *Microsoft official advisories*:


Related