CVE-2024-43485: .NET and Visual Studio Denial of Service Vulnerability
Overview
- Severity
- High (CVSS 7.5)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
- Category
- Denial of Service
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2024-Oct
- Released
- 2024-10-08
- Last Updated
- 2025-01-29
- EPSS Score
- 0.74% (percentile: 72.9%)
Affected Products (15)
Developer Tools
- PowerShell 7.2
- PowerShell 7.4
- Microsoft Visual Studio 2022 version 17.6
- Microsoft Visual Studio 2022 version 17.8
- Microsoft Visual Studio 2022 version 17.10
- Microsoft Visual Studio 2022 version 17.11
- PowerShell 7.5 installed on MacOS
- PowerShell 7.5 installed on Linux
- PowerShell 7.5 installed on Windows
- .NET 8.0 installed on Linux
- .NET 6.0 installed on Linux
- .NET 6.0 installed on Windows
- .NET 8.0 installed on Mac OS
- .NET 6.0 installed on Mac OS
- .NET 8.0 installed on Windows
Security Updates (7)
Acknowledgments
Eirik George Tsarpalis of Microsoft Corporation
Revision History
- 2024-10-08: Information published.
- 2024-10-09: Updated acknowledgment. This is an informational change only.
- 2024-10-23: Revised the Security Updates table to include PowerShell 7.2 and PowerShell 7.4 because these versions of PowerShell 7 are affected by this vulnerability. See https://github.com/PowerShell/Announcements/issues/71 for more information.
- 2025-01-29: Revised the Security Updates table to include PowerShell 7.5 installed on Windows, PowerShell 7.5 installed on Linux, and PowerShell 7.5 installed on MacOC because these versions of PowerShell 7 are affected by this vulnerability. See https://github.com/PowerShell/Announcements/issues/71 for more information.