Visual Studio, Visual Studio Code and Microsoft Azure Storage Explorer Elevation of Privilege Vulnerability - CVE-2020-1416ID: oval:org.secpod.oval:def:64394 | Date: (C)2020-07-16 (M)2023-03-16 |
Class: VULNERABILITY | Family: windows |
An elevation of privilege vulnerability exists in Microsoft Azure Storage Explorer, Visual Studio and Visual Studio Code when they load software dependencies. A local attacker who successfully exploited the vulnerability could inject arbitrary code to run in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, a local attacker would need to plant malicious content on an affected computer and wait for another user to launch Visual Studio or Visual Studio Code. The update address the vulnerability by modifying the way Visual Studio and Visual Studio Code load software dependencies.
Platform: |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows 10 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |
Product: |
Visual Studio Code |
Microsoft Visual Studio 2017 |
Microsoft Visual Studio 2019 |
Microsoft Azure Storage Explorer |