CVE-2023-36759: Visual Studio Elevation of Privilege Vulnerability

Overview

Severity
Medium (CVSS 6.7)
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2023-Sep
Released
2023-09-12
EPSS Score
0.33% (percentile: 55.6%)

FAQ

What privileges could be gained by an attacker who successfully exploited the vulnerability? A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authenticated attacker must send the victim a malicious file and convince them to open it.

Affected Products (5)

Developer Tools

  • Microsoft Visual Studio 2022 version 17.2
  • Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
  • Microsoft Visual Studio 2022 version 17.4
  • Microsoft Visual Studio 2022 version 17.7
  • Microsoft Visual Studio 2022 version 17.6

Security Updates (5)

Acknowledgments

<a href="https://github.com/zeze-zeze">Zeze</a> with <a href="https://teamt5.org/tw/">TeamT5</a>

Revision History

  • 2023-09-12: Information published.