7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.002 Low
EPSS
Percentile
57.2%
04/12/2022
High
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service.
Microsoft .NET Framework 4.5.2
Microsoft .NET Framework 4.8
Microsoft .NET Framework 3.5 AND 4.8
Microsoft .NET Framework 3.5 AND 4.7.2
PowerShell 7.1
PowerShell 7.0
PowerShell 7.2
YARP 1.0
YARP 1.1RC
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2022-24513
CVE-2022-24767
CVE-2022-26832
CVE-2022-26921
CVE-2022-24765
CVE-2022-26924
CVE-2022-26788
ACE
CVE-2022-267887.8Critical
CVE-2022-245137.8Critical
CVE-2022-247677.8Critical
CVE-2022-268327.5Critical
CVE-2022-269217.3High
CVE-2022-247657.8Critical
CVE-2022-269247.5Critical
5012596
5012117
5012326
5012332
5012327
5012331
5012329
5012324
5012328
5012325
5012123
5012121
5012120
5012118
5012330
5016568
support.microsoft.com/kb/5012117
support.microsoft.com/kb/5012118
support.microsoft.com/kb/5012120
support.microsoft.com/kb/5012121
support.microsoft.com/kb/5012123
support.microsoft.com/kb/5012324
support.microsoft.com/kb/5012325
support.microsoft.com/kb/5012326
support.microsoft.com/kb/5012327
support.microsoft.com/kb/5012328
support.microsoft.com/kb/5012329
support.microsoft.com/kb/5012330
support.microsoft.com/kb/5012331
support.microsoft.com/kb/5012332
support.microsoft.com/kb/5012596
support.microsoft.com/kb/5016568
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24513
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24767
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26832
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26921
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26924
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24513
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24765
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24767
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26788
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26832
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26921
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26924
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Microsoft-.NET-Framework/
threats.kaspersky.com/en/product/Microsoft-Visual-Studio/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.002 Low
EPSS
Percentile
57.2%