CVE-2024-43498: .NET and Visual Studio Remote Code Execution Vulnerability

Overview

Severity
Critical (CVSS 9.8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2024-Nov
Released
2024-11-12
Last Updated
2025-01-29
EPSS Score
1.32% (percentile: 79.9%)

FAQ

How could an attacker exploit this vulnerability? A remote unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to a vulnerable .NET webapp or by loading a specially crafted file into a vulnerable desktop app.

Affected Products (10)

Developer Tools

  • PowerShell 7.5 installed on MacOS
  • PowerShell 7.5 installed on Linux
  • PowerShell 7.5 installed on Windows
  • Microsoft Visual Studio 2022 version 17.8
  • Microsoft Visual Studio 2022 version 17.6
  • Microsoft Visual Studio 2022 version 17.10
  • Microsoft Visual Studio 2022 version 17.11
  • .NET 9.0 installed on Mac OS
  • .NET 9.0 installed on Windows
  • .NET 9.0 installed on Linux

Security Updates (6)

Revision History

  • 2024-11-12: Information published.
  • 2025-01-29: Revised the Security Updates table to include PowerShell 7.5 installed on Windows, PowerShell 7.5 installed on Linux, and PowerShell 7.5 installed on MacOC because these versions of PowerShell 7 are affected by this vulnerability. See https://github.com/PowerShell/Announcements/issues/74 for more information.