CVE-2025-21178: Visual Studio Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 8.8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2025-Jan
Released
2025-01-14
Last Updated
2025-02-14
EPSS Score
0.36% (percentile: 58.0%)

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of this vulnerability requires that an attacker convinces a user to open a maliciously crafted package file in Visual Studio.

Affected Products (7)

Developer Tools

  • Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
  • Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
  • Microsoft Visual Studio 2022 version 17.6
  • Microsoft Visual Studio 2022 version 17.8
  • Microsoft Visual Studio 2022 version 17.10
  • Microsoft Visual Studio 2015 Update 3
  • Microsoft Visual Studio 2022 version 17.12

Security Updates (7)

Acknowledgments

<a href="https://infosec.exchange/@ynwarcs">goodbyeselene</a>

Revision History

  • 2025-01-14: Information published.
  • 2025-02-11: In the Security Updates table, added Visual Studio 2015 Update 3, as this version of Visual Studio is also affected by this vulnerability. Microsoft recommends that customers running Visual Studio 2015 Update 3 install the update to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.
  • 2025-02-14: In the Security Updates table, added Visual Studio 2015 Update 3 as it is affected by this vulnerability, and removed Visual Studio 2013 Update 5 as it is not affected by this vulnerability. Microsoft recommends that customers install the update for Visual Studio 2015 Update 3 to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.