Lucene search

K
vulnrichmentMicrosoftVULNRICHMENT:CVE-2023-32032
HistoryJun 13, 2023 - 11:26 p.m.

CVE-2023-32032 .NET and Visual Studio Elevation of Privilege Vulnerability

2023-06-1323:26:21
CWE-20
microsoft
github.com
4
cve-2023-32032
elevation of privilege

CVSS3

6.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H/E:P/RL:O/RC:C

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

38.4%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

CNA Affected

[
  {
    "cpes": [
      "cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": ".NET 7.0",
    "versions": [
      {
        "status": "affected",
        "version": "7.0.0",
        "lessThan": "7.0.7",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "Unknown"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Microsoft Visual Studio 2022 version 17.2",
    "versions": [
      {
        "status": "affected",
        "version": "17.2.0",
        "lessThan": "17.2.16",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "Unknown"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Microsoft Visual Studio 2022 version 17.0",
    "versions": [
      {
        "status": "affected",
        "version": "17.0.0",
        "lessThan": "17.0.22",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "Unknown"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:a:microsoft:visual_studio_2022:17.4:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Microsoft Visual Studio 2022 version 17.4",
    "versions": [
      {
        "status": "affected",
        "version": "17.4.0",
        "lessThan": "17.4.8",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "Unknown"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:a:microsoft:visual_studio:2022:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Microsoft Visual Studio 2022 version 17.6",
    "versions": [
      {
        "status": "affected",
        "version": "17.6.0",
        "lessThan": "17.6.3",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "Unknown"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:a:microsoft:powershell:7.3:-:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "PowerShell 7.3",
    "versions": [
      {
        "status": "affected",
        "version": "7.3.0",
        "lessThan": "7.3.5",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "Unknown"
    ]
  }
]

CVSS3

6.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H/E:P/RL:O/RC:C

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

38.4%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial