7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0 Low
EPSS
Percentile
46.0%
04/11/2023
High
Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, spoof user interface.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Microsoft Visual Studio 2022 version 17.5
Microsoft Visual Studio 2022 version 17.4
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
.NET 6.0
.NET 7.0
Microsoft Visual Studio 2022 version 17.2
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
Visual Studio Code
Microsoft Visual Studio 2022 version 17.0
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2023-28296
CVE-2023-28263
CVE-2023-24893
CVE-2023-28262
CVE-2023-28299
CVE-2023-28260
ACE
CVE-2023-282607.8Critical
CVE-2023-282967.8Critical
CVE-2023-282635.5High
CVE-2023-248937.8Critical
CVE-2023-282627.8Critical
CVE-2023-282995.5High
support.microsoft.com/kb/5025915
support.microsoft.com/kb/5025916
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28260
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28262
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28263
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28296
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28299
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24893
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28260
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28262
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28263
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28296
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28299
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Visual-Studio/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0 Low
EPSS
Percentile
46.0%