CVE-2023-33135: .NET and Visual Studio Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 7.3)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2023-Jun
Released
2023-06-13
EPSS Score
0.89% (percentile: 75.6%)

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. What privileges could be gained by an attacker who successfully exploited the vulnerability? Low-privilege attackers who successfully exploited the vulnerability could potentially write malicious configurations and download malicious files. According to the CVSS metric, user interaction is required (UI:R) and privileges required  is low (PR:L). What does that mean for this vulnerability? An authorized attacker must send the user a malicious file and convince the user to open it.

Affected Products (6)

Developer Tools

  • .NET 6.0
  • .NET 7.0
  • Microsoft Visual Studio 2022 version 17.2
  • Microsoft Visual Studio 2022 version 17.0
  • Microsoft Visual Studio 2022 version 17.4
  • Microsoft Visual Studio 2022 version 17.6

Security Updates (6)

Acknowledgments

<a href="https://github.com/ycdxsb">ycdxsb</a> with <a href="http://www.iie.ac.cn/">VARAS@IIE</a>

Revision History

  • 2023-06-13: Information published.