CVE-2025-21178: Visual Studio Remote Code Execution Vulnerability
Overview
- Severity
- High (CVSS 8.8)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2025-Jan
- Released
- 2025-01-14
- Last Updated
- 2025-02-14
- EPSS Score
- 0.36% (percentile: 58.0%)
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of this vulnerability requires that an attacker convinces a user to open a maliciously crafted package file in Visual Studio.
Affected Products (7)
Developer Tools
- Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
- Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
- Microsoft Visual Studio 2022 version 17.6
- Microsoft Visual Studio 2022 version 17.8
- Microsoft Visual Studio 2022 version 17.10
- Microsoft Visual Studio 2015 Update 3
- Microsoft Visual Studio 2022 version 17.12
Security Updates (7)
Acknowledgments
<a href="https://infosec.exchange/@ynwarcs">goodbyeselene</a>
Revision History
- 2025-01-14: Information published.
- 2025-02-11: In the Security Updates table, added Visual Studio 2015 Update 3, as this version of Visual Studio is also affected by this vulnerability.
Microsoft recommends that customers running Visual Studio 2015 Update 3 install the update to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.
- 2025-02-14: In the Security Updates table, added Visual Studio 2015 Update 3 as it is affected by this vulnerability, and removed Visual Studio 2013 Update 5 as it is not affected by this vulnerability.
Microsoft recommends that customers install the update for Visual Studio 2015 Update 3 to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.