CVE-2021-31211: Visual Studio Code Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 7.8)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2021-May
Released
2021-05-11
EPSS Score
9.31% (percentile: 92.8%)

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have be enticed to open a malicious file in a directory. Users should never open anything that they do not know or trust to be safe. How do I know if I am affected by this vulnerability? Customers running any Visual Studio Code Remote extensions (for example: Visual Studio Code Remote - SSH, Visual Studio Code Remote - Containers, or Visual Studio Code Remote - WSL extensions) are affected by this vulnerability. The fix for the vulnerability is in Visual Studio Code and not in the extensions. Customers running a Visual Studio Code Remote extension need to update Visual Studio Code to be protected from this vulnerability.

Affected Products (1)

Developer Tools

  • Visual Studio Code

Security Updates (1)

Acknowledgments

RyotaK (https://twitter.com/ryotkak)

Revision History

  • 2021-05-11: Information published.