CVE-2023-21566

External Control of File Name or Path (CWE-73)

Published: Feb 14, 2023

010
CVSS 7.8EPSS 0.05%High
CVE info copied to clipboard

Visual Studio Elevation of Privilege Vulnerability

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Timeline

First Article

Feedly found the first article mentioning CVE-2023-21566. See article

Feb 14, 2023 at 6:05 PM / msrc.microsoft.com
EPSS

EPSS Score was set to: 0.05% (Percentile: 14.7%)

Sep 22, 2023 at 2:32 AM
Static CVE Timeline Graph

Affected Systems

Microsoft/visual_studio_2022
+null more

Patches

Microsoft
+null more

Links to Mitre Att&cks

T1562.003: Impair Command History Logging
+null more

Attack Patterns

CAPEC-13: Subverting Environment Variable Values
+null more

References

Visual Studio Elevation of Privilege Vulnerability
What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Vulnerability Summary for the Week of February 13, 2023
Original release date: February 23, 2023 High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info baicells -- neutrino_430_firmware Baicells Nova 436Q, Nova 430E, Nova 430I, and Neutrino 430 LTE TDD eNodeB devices with firmware through QRTB 2.12.7 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce. 2023-02-11 10 CVE-2023-0776 MISC webbuildersgroup -- silverstripe-kapost-bridge A vulnerability was found in webbuilders-group silverstripe-kapost-bridge 0.3.3. It has been declared as critical. Affected by this vulnerability is the function index/getPreview of the file code/control/KapostService.php. The manipulation leads to sql injection. The attack can be launched remotely. Upgrading to version 0.4.0 is able to address this issue.

News

Vulnerability Summary for the Week of February 13, 2023
Vulnerability Summary for the Week of February 13, 2023 dwilliams Feb 24, 2023 The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. NVD is sponsored by CISA. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High: vulnerabilities with a CVSS base score of 7.0–10.0 Medium: vulnerabilities with a CVSS base score of 4.0–6.9 Low: vulnerabilities with a CVSS base score of 0.0–3.9 Entries may include additional information provided by organizations and efforts sponsored by CISA.
US-CERT Bulletin (SB23-052):Vulnerability Summary for the Week of February 13, 2023
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. NVD is sponsored by CISA. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High : vulnerabilities with a CVSS base score of 7.0–10.0 Medium : vulnerabilities with a CVSS base score of 4.0–6.9 Low : vulnerabilities with a CVSS base score of 0.0–3.9 Entries may include additional information provided by organizations and efforts sponsored by CISA.
Vulnerability Summary for the Week of February 13, 2023
Original release date: February 23, 2023 High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info baicells -- neutrino_430_firmware Baicells Nova 436Q, Nova 430E, Nova 430I, and Neutrino 430 LTE TDD eNodeB devices with firmware through QRTB 2.12.7 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce. 2023-02-11 10 CVE-2023-0776 MISC webbuildersgroup -- silverstripe-kapost-bridge A vulnerability was found in webbuilders-group silverstripe-kapost-bridge 0.3.3. It has been declared as critical. Affected by this vulnerability is the function index/getPreview of the file code/control/KapostService.php. The manipulation leads to sql injection. The attack can be launched remotely. Upgrading to version 0.4.0 is able to address this issue.
Rewterz Threat Advisory – Multiple Microsoft Visual Studio Vulnerabilities
By executing the Visual Studio installer, a local authenticated attacker could exploit this vulnerability to cause a denial of service. Microsoft Visual Studio could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the Installer component.
Rewterz Threat Advisory – Multiple Microsoft Visual Studio Vulnerabilities
By executing the Visual Studio installer, a local authenticated attacker could exploit this vulnerability to cause a denial of service. Microsoft Visual Studio could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the Installer component.
See 39 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI