First published: Tue Jun 13 2023(Updated: )
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/Microsoft.WindowsDesktop.App.Runtime.win-x86 | >=6.0.0<=6.0.16 | 6.0.18 |
nuget/Microsoft.WindowsDesktop.App.Runtime.win-x64 | >=6.0.0<=6.0.16 | 6.0.18 |
nuget/Microsoft.WindowsDesktop.App.Runtime.win-arm64 | >=6.0.0<=6.0.16 | 6.0.18 |
nuget/Microsoft.WindowsDesktop.App.Runtime.win-x86 | >=7.0.0<=7.0.5 | 7.0.7 |
nuget/Microsoft.WindowsDesktop.App.Runtime.win-x64 | >=7.0.0<=7.0.5 | 7.0.7 |
nuget/Microsoft.WindowsDesktop.App.Runtime.win-arm64 | >=7.0.0<=7.0.5 | 7.0.7 |
Microsoft .NET 7.0 | ||
Microsoft .NET Framework | =3.5 | |
Microsoft PowerShell | ||
Microsoft PowerShell | ||
Microsoft .NET Framework 4 | =3.0 | |
Microsoft .NET Framework 4 | =2.0 | |
Microsoft .NET Framework 4 | =2.0 | |
Microsoft .NET Framework 4 | =4.6.2 | |
Microsoft .NET Framework 4 | =3.5.1 | |
Microsoft .NET Framework 4 | =3.0 | |
Microsoft .NET Framework 4 | =4.8 | |
Microsoft .NET Framework 4 | =4.6.2=4.7=4.7.1=4.7.2 | |
Microsoft .NET Framework 4 | =4.8 | |
Microsoft .NET Framework 4 | =3.5 | |
Microsoft .NET Framework 4 | =4.6.2=4.7=4.7.1=4.7.2 | |
Microsoft .NET Framework 4 | =4.6.2=4.7=4.7.1=4.7.2 | |
Microsoft .NET Framework 4 | =4.8 | |
Microsoft .NET Framework 4 | =3.5=4.6.2=4.7=4.7.1=4.7.2 | |
Microsoft .NET Framework 4 | =3.5 | |
Microsoft .NET Framework 4 | =4.8 | |
Microsoft .NET Framework 4 | =3.5=4.8 | |
Microsoft .NET Framework 4 | =3.5=4.7.2 | |
Microsoft .NET Framework 4 | =3.5=4.7.2 | |
Microsoft .NET Framework 4 | =3.5=4.8.1 | |
Microsoft .NET Framework 4 | =3.5=4.8 | |
Microsoft .NET Framework 4 | =3.5=4.8.1 | |
Microsoft .NET Framework 4 | =3.5=4.8 | |
Microsoft .NET Framework 4 | =3.5=4.8.1 | |
Microsoft .NET Framework 4 | =3.5=4.8 | |
Microsoft .NET Framework 4 | =3.5=4.8.1 | |
Microsoft .NET Framework 4 | =3.5=4.8.1 | |
Visual Studio Community 2022 | =17.2 | |
Visual Studio Community 2022 | =17.4 | |
Visual Studio Community 2022 | =17.0 | |
Microsoft .NET Framework 4 | =4.8 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft .NET Framework 4 | =4.6.2 | |
Microsoft .NET Framework 4 | =4.7 | |
Microsoft .NET Framework 4 | =4.7.1 | |
Microsoft .NET Framework 4 | =4.7.2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft .NET Framework 4 | =3.5.1 | |
Microsoft .NET Framework 4 | =3.5 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft .NET Framework 4 | =4.8.1 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Windows 11 | ||
Windows 11 | ||
Windows 11 | ||
Windows 11 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows Server 2019 | ||
Microsoft .NET Framework 4 | =3.0-sp2 | |
Microsoft .NET Framework 4 | =2.0-sp2 | |
Microsoft .NET Framework | =6.0.0 | |
Microsoft .NET Framework | =7.0.0 | |
Visual Studio Community 2022 | >=17.0<17.0.22 | |
Visual Studio Community 2022 | >=17.2<17.2.16 | |
Visual Studio Community 2022 | >=17.4<17.4.8 | |
Visual Studio Community 2022 | >=17.6<17.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24895 is classified as a remote code execution vulnerability with a critical severity rating.
To fix CVE-2023-24895, upgrade your affected .NET Framework or Visual Studio installation to the latest version as recommended by Microsoft.
CVE-2023-24895 affects specific versions of .NET Framework, Visual Studio, and the Microsoft.WindowsDesktop.App.Runtime packages.
The potential impacts of CVE-2023-24895 include unauthorized access and execution of arbitrary code on affected systems.
As of now, there are reports indicating that CVE-2023-24895 is being actively exploited in the wild.