Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
A vulnerability exists in .NET runtime TlsStream which may result in Information Disclosure. This issue affects .NET 8.0 and Visual Studio 2022.
This vulnerability could lead to the exposure of sensitive information to unauthorized actors. The attack vector is network-based and requires user interaction. The confidentiality impact is rated as HIGH, while integrity and availability impacts are NONE. This suggests that an attacker could potentially access sensitive data but cannot modify or disrupt system operations.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. Microsoft has released updates to address this vulnerability.
1. Update .NET to version 8.0.8 or later. 2. Update Visual Studio 2022 to the following versions based on your current version: - Version 17.10.6 or later if you're using 17.10.x - Version 17.8.13 or later if you're using 17.8.x - Version 17.6.18 or later if you're using 17.6.x 3. If immediate patching is not possible, limit network exposure for all affected systems and ensure that user interactions are necessary for exploitation. 4. Monitor for any suspicious network activities that might indicate attempts to exploit this vulnerability.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
RedHat CVE advisory released a security advisory (CVE-2024-38167).
A CVSS base score of 6.5 has been assigned.
Feedly found the first article mentioning CVE-2024-38167. See article
Feedly estimated the CVSS score as MEDIUM
NVD published the first details for CVE-2024-38167
Detection for the vulnerability has been added to Nessus (206237)
Detection for the vulnerability has been added to Qualys (286082)
A CVSS base score of 6.5 has been assigned.