7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 High
AI Score
Confidence
High
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
47.6%
11/08/2022
High
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code.
Public exploits exist for this vulnerability.
Windows Sysmon
Microsoft .NET Framework 4.6.2
Microsoft Visual Studio 2022 version 17.2
Microsoft .NET Framework 4.8
Nuget 2.1.2
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
Microsoft .NET Framework 4.7.2
Nuget 4.8.5
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2
Microsoft Visual Studio 2022 version 17.0
Microsoft Visual Studio 2022 version 17.3
Microsoft .NET Framework 4.8.1
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2022-41120
CVE-2022-41064
CVE-2022-41119
CVE-2022-39253
ACE
CVE-2022-411207.8Critical
CVE-2022-410645.8High
CVE-2022-411197.8Critical
CVE-2022-392535.5High
5020690
5020687
5020678
5020695
5020691
5020685
5020681
5020801
5020686
5019970
5020694
5020679
5020614
5020622
5020680
5020689
5020688
5019964
5020692
support.microsoft.com/kb/5019964
support.microsoft.com/kb/5019970
support.microsoft.com/kb/5020614
support.microsoft.com/kb/5020622
support.microsoft.com/kb/5020678
support.microsoft.com/kb/5020679
support.microsoft.com/kb/5020680
support.microsoft.com/kb/5020681
support.microsoft.com/kb/5020685
support.microsoft.com/kb/5020686
support.microsoft.com/kb/5020687
support.microsoft.com/kb/5020688
support.microsoft.com/kb/5020689
support.microsoft.com/kb/5020690
support.microsoft.com/kb/5020691
support.microsoft.com/kb/5020692
support.microsoft.com/kb/5020694
support.microsoft.com/kb/5020695
support.microsoft.com/kb/5020801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41064
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41119
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41120
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-39253
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41064
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41119
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41120
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Microsoft-.NET-Framework/
threats.kaspersky.com/en/product/Microsoft-Visual-Studio/
threats.kaspersky.com/en/product/Microsoft-Windows/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 High
AI Score
Confidence
High
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
47.6%