7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
Applies to: All Visual Studio 2015 Update 3 editions except Isolated and Integrated Shells, Build Tools, Remote Tools, and Express for Web
NoticeIn November 2020, the content of this article was updated to clarify the affected products, prerequisites, and restart requirements. Additionally, the update metadata in WSUS was revised to fix a Microsoft System Center Configuration Manager reporting bug.
A remote code execution vulnerability exists in Microsoft Visual Studio 2015 when it incorrectly handles objects in memory.To learn more about the vulnerability, see CVE-2020-16874 and CVE-2020-16856.
The following file is available for download:Download the hotfix package now.
To get the standalone package for this update, go to the Microsoft Update Catalog website.
To apply this security update, you must have both Visual Studio 2015 Update 3 and the subsequent Cumulative Servicing Release KB 3165756 installed. Typically, KB 3165756 is installed automatically when you install Visual Studio 2015 Update 3. However, in some cases, you have to install the two packages separately.
We recommend that you close Visual Studio 2015 before you install this security update. Otherwise, you may have to restart the computer after you apply this security update if a file that is being updated is open or in use by Visual Studio.
This security update doesn’t replace other security updates.
File name | SHA1 hash | SHA256 hash |
---|---|---|
vs14-kb4571481.exe | 4C12ABEE43A0549C56DE8DCF31D7B7BE5C3AE035 | 9B31156D77CFEBCB85C50959FC649CA37FDB9584E5A805AAEC80EBD82FE4EA7C |
To verify that this security update is applied correctly, follow these steps:
Protect yourself online: Windows Security support
Learn how we guard against cyber threats: Microsoft Security
Obtain localized support per your country: International Support
Get more information about the Visual Studio support policy: Visual Studio Product Lifecycle and Servicing.
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C