First published: Tue Jun 06 2023(Updated: )
.NET and Visual Studio Elevation of Privilege Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft PowerShell 7.3 | ||
Microsoft Visual Studio 2022 | =17.6 | |
Microsoft Visual Studio 2022 | =17.0 | |
Microsoft Visual Studio 2022 | =17.2 | |
Microsoft .NET 7.0 | ||
Microsoft .NET | >=7.0.0<7.0.7 | |
Microsoft Visual Studio 2022 | >=17.0<17.0.22 | |
Microsoft Visual Studio 2022 | >=17.2<17.2.16 | |
Microsoft Visual Studio 2022 | >=17.4<17.4.8 | |
Microsoft Visual Studio 2022 | >=17.6<17.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32032 is a vulnerability that affects .NET and Visual Studio. It allows an attacker to elevate privileges in the system.
CVE-2023-32032 has a severity rating of 6.5, which is considered high.
The following software versions are affected by CVE-2023-32032: Microsoft Visual Studio 2022 version 17.0, 17.2, and 17.6, .NET 7.0, and PowerShell 7.3.
To fix CVE-2023-32032 in Visual Studio 2022 version 17.0, you should install the patch provided by Microsoft. The patch can be downloaded from: [Patch URL for Visual Studio 2022 version 17.0]
More information about CVE-2023-32032 can be found on the following websites: [MSRC Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32032), [Red Hat CVE](https://access.redhat.com/security/cve/CVE-2023-32032), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2214900).