Lucene search

K
nvd[email protected]NVD:CVE-2024-0057
HistoryJan 09, 2024 - 6:15 p.m.

CVE-2024-0057

2024-01-0918:15:46
CWE-20
web.nvd.nist.gov
3
security
bypass
vulnerability
net
framework
visual studio

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.6%

NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability

Affected configurations

NVD
Node
microsoftpowershellRange7.2–7.2.18
OR
microsoftpowershellRange7.3–7.3.11
OR
microsoftpowershellMatch7.4-
OR
microsoftvisual_studio_2022Range17.2–17.2.23
OR
microsoftvisual_studio_2022Range17.4–17.4.15
OR
microsoftvisual_studio_2022Range17.6–17.6.11
OR
microsoftvisual_studio_2022Range17.8–17.8.4
Node
microsoft.net_frameworkRange4.8–4.8.04690.02
AND
microsoftwindows_10_1607Match-x64
OR
microsoftwindows_10_1607Match-x86
OR
microsoftwindows_server_2008Matchr2sp1x64
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
OR
microsoftwindows_server_2016Match-
Node
microsoft.net_frameworkRange4.8–4.8.04690.01
AND
microsoftwindows_server_2008Matchr2sp1x64
Node
microsoft.net_frameworkMatch4.6.2
OR
microsoft.net_frameworkMatch4.7
OR
microsoft.net_frameworkMatch4.7.1
OR
microsoft.net_frameworkMatch4.7.2
AND
microsoftwindows_server_2008Matchr2sp1x64
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
Node
microsoft.net_frameworkMatch3.5
OR
microsoft.net_frameworkMatch4.8.1
AND
microsoftwindows_10_1809Match-x64
OR
microsoftwindows_10_1809Match-x86
OR
microsoftwindows_10_21h2Match-arm64
OR
microsoftwindows_10_21h2Match-x64
OR
microsoftwindows_10_21h2Match-x86
OR
microsoftwindows_10_22h2Match-arm64
OR
microsoftwindows_10_22h2Match-x64
OR
microsoftwindows_10_22h2Match-x86
OR
microsoftwindows_11_21h2Match-arm64
OR
microsoftwindows_11_21h2Match-x64
OR
microsoftwindows_11_22h2Match-arm64
OR
microsoftwindows_11_22h2Match-x64
OR
microsoftwindows_11_23h2Match-arm64
OR
microsoftwindows_11_23h2Match-x64
OR
microsoftwindows_server_2019Match-
OR
microsoftwindows_server_2022Match-
OR
microsoftwindows_server_2022_23h2Match-
Node
microsoft.net_frameworkRange4.8–4.8.04690.02
OR
microsoft.net_frameworkMatch3.5
AND
microsoftwindows_10_1809Match-x64
OR
microsoftwindows_10_1809Match-x86
OR
microsoftwindows_10_21h2Match-arm64
OR
microsoftwindows_10_21h2Match-x64
OR
microsoftwindows_10_21h2Match-x86
OR
microsoftwindows_10_22h2Match-arm64
OR
microsoftwindows_10_22h2Match-x64
OR
microsoftwindows_10_22h2Match-x86
OR
microsoftwindows_11_21h2Match-arm64
OR
microsoftwindows_11_21h2Match-x64
OR
microsoftwindows_11_22h2Match-arm64
OR
microsoftwindows_11_22h2Match-x64
OR
microsoftwindows_server_2019Match-
OR
microsoftwindows_server_2022Match-
OR
microsoftwindows_server_2022_23h2Match-
Node
microsoft.net_frameworkMatch3.5
OR
microsoft.net_frameworkMatch4.7.2
AND
microsoftwindows_10_1607Match-x64
OR
microsoftwindows_10_1607Match-x86
OR
microsoftwindows_10_1809Match-arm64
OR
microsoftwindows_10_1809Match-x64
OR
microsoftwindows_10_1809Match-x86
OR
microsoftwindows_server_2016Match-
OR
microsoftwindows_server_2019Match-
Node
microsoft.net_frameworkMatch2.0sp2
OR
microsoft.net_frameworkMatch3.0sp2
AND
microsoftwindows_server_2008Match-sp2x64
OR
microsoftwindows_server_2008Match-sp2x86
Node
microsoft.netRange6.0.0–6.0.26
OR
microsoft.netRange7.0.0–7.0.15
OR
microsoft.netMatch8.0.0-

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.6%