First published: Tue Oct 08 2024(Updated: )
Visual C++ Redistributable Installer Elevation of Privilege Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Visual Studio 2019 | =16.11 | |
Microsoft Visual Studio 2017 | =15.9 | |
Visual Studio Professional 2022 | =17.6 | |
Visual Studio Professional 2022 | =17.11 | |
Visual Studio Professional 2022 | =17.8 | |
Microsoft Visual C++ 2017 Redistributable | ||
Visual Studio Professional 2017 | >=15.0<15.9.67 | |
Visual Studio Professional 2019 | >=15.0<15.9.67 | |
Visual Studio Professional 2019 | >=16.0<16.11.41 | |
Visual Studio Professional 2022 | >=17.6.0<17.6.20 | |
Visual Studio Professional 2022 | >=17.8.0<17.8.15 | |
Visual Studio Professional 2022 | >=17.10.0<17.10.8 | |
Visual Studio Professional 2022 | >=17.11.0<17.11.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-43590 is classified as an elevation of privilege vulnerability in the Visual C++ Redistributable Installer.
To fix CVE-2024-43590, update to the latest version of Visual Studio 2022, Visual Studio 2019, or Visual Studio 2017 that addresses this vulnerability.
CVE-2024-43590 affects Visual Studio 2017, 2019, and 2022, as well as the Visual C++ Redistributable Installer.
Yes, patches for CVE-2024-43590 are available as updates for the affected versions of Visual Studio.
The vulnerable versions include Visual Studio 2017 version 15.9, Visual Studio 2019 version 16.11, and multiple versions of Visual Studio 2022 up to 17.10.