CVE-2021-34485: .NET Core and Visual Studio Information Disclosure Vulnerability
Overview
- Severity
- Medium (CVSS 5)
- CVSS Vector
- CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
- Category
- Information Disclosure
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2021-Aug
- Released
- 2021-08-10
- Last Updated
- 2021-08-19
- EPSS Score
- 0.66% (percentile: 71.2%)
FAQ
What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of a specific dump file. The attacker needs to have local access to the target system and the dump file needs to be created in a specific way by a target on that same system.
Affected Products (10)
Other
- 11600
- 11720
- 11785
- 11872
- 11900
- 11925
- 11745
- 11565
- 11730
- 11761
Security Updates (9)
Revision History
- 2021-08-10: Information published.
- 2021-08-10: In the Security Updates table, added links to the Release Notes. This is an informational change only.
- 2021-08-12: Revised the Security Updates table to include PowerShell 7.0 and PowerShell 7.1 because these versions of PowerShell 7 incorporate the versions of .NET Core that are affected by this vulnerability. See https://github.com/PowerShell/Announcements/issues/24 for more information.
- 2021-08-19: To comprehensively address this vulnerability, Microsoft has released .NET Core 2.1 Build Number 2.1.30. Customers who have downloaded Build 2.1.29 should download and install Build 2.1.30 to be fully protected from this vulnerability.