Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-21409

Опубликовано: 09 апр. 2024
Источник: msrc
CVSS3: 7.3
EPSS Средний

Описание

.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

FAQ

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.

For .NET 7.0 and .NET 8.0, what operating systems are affected by this vulnerability?

This is a Windows-only vulnerability for .NET 7.0 and .NET 8.0. For more information see Microsoft Security Advisory CVE-2024-21409 | .NET Elevation of Privilege Vulnerability.

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this remote code execution vulnerability?

An authenticated attacker who successfully exploited a vulnerability in WordPad when closing a maliciously crafted .docx file could trigger execution of malicious code.

Обновления

ПродуктСтатьяОбновление
PowerShell 7.2
.NET 6.0
Microsoft Visual Studio 2022 version 17.4
.NET 7.0
PowerShell 7.3
Microsoft Visual Studio 2022 version 17.6
.NET 8.0
PowerShell 7.4
Microsoft Visual Studio 2022 version 17.8
Microsoft Visual Studio 2022 version 17.9

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 98%
0.54695
Средний

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
почти 2 года назад

.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

CVSS3: 7.3
redhat
почти 2 года назад

.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

CVSS3: 7.3
nvd
почти 2 года назад

.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

CVSS3: 7.3
github
почти 2 года назад

.NET Elevation of Privilege Vulnerability

CVSS3: 7.3
fstec
почти 2 года назад

Уязвимость программных платформ Microsoft .NET Framework, .NET и средства разработки программного обеспечения Microsoft Visual Studio, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 98%
0.54695
Средний

7.3 High

CVSS3