First published: Tue Jun 11 2024(Updated: )
Visual Studio Elevation of Privilege Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Visual Studio 2019 | =16.11 | |
Microsoft Visual Studio 2017 | =15.9 | |
Visual Studio Professional 2022 | =17.10 | |
Visual Studio Professional 2022 | =17.6 | |
Visual Studio Professional 2022 | =17.8 | |
Visual Studio Professional 2017 | >=15.0<15.9.63 | |
Visual Studio Professional 2019 | >=16.0<16.11.37 | |
Visual Studio Professional 2022 | >=17.4<17.4.20 | |
Visual Studio Professional 2022 | >=17.6<17.6.16 | |
Visual Studio Professional 2022 | >=17.8<17.8.11 | |
Visual Studio Professional 2022 | >=17.10<17.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29060 is classified as an elevation of privilege vulnerability.
To fix CVE-2024-29060, update to the latest version of Visual Studio as specified in Microsoft’s release notes.
CVE-2024-29060 affects Visual Studio 2017 (15.9), 2019 (16.11), and 2022 (17.6, 17.8, and 17.10) versions.
If exploited, CVE-2024-29060 could allow an attacker to gain elevated privileges on the system.
Yes, Microsoft provides patches for CVE-2024-29060 through its update system for all affected Visual Studio versions.