CVE-2024-38167: .NET and Visual Studio Information Disclosure Vulnerability

Overview

Severity
Medium (CVSS 6.5)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Category
Information Disclosure
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2024-Aug
Released
2024-08-13
Last Updated
2024-10-11
EPSS Score
1.99% (percentile: 83.6%)

FAQ

What type of information could be disclosed by this vulnerability? An attacker who successfully exploited the vulnerability could read targeted email messages. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of this vulnerability requires that a user trigger the payload in the application.

Affected Products (4)

Developer Tools

  • Microsoft Visual Studio 2022 version 17.10
  • Microsoft Visual Studio 2022 version 17.8
  • .NET 8.0
  • Microsoft Visual Studio 2022 version 17.6

Security Updates (4)

Acknowledgments

Alex Appleton, D. E. Shaw & Co., L.P., <a href="https://www.linkedin.com/in/rokonec/">Roman Konecny</a>, Microsoft

Revision History

  • 2024-08-13: Information published.
  • 2024-09-27: Acknowledgement added. This is an informational change only.
  • 2024-10-11: Added an acknowledgement. This is an informational change only.