.NET、.NET Framework 和 Visual Studio 權限提高弱點
發行日期: 2023年6月13日
上次更新:2023年9月12日
- Assigning CNA
- Microsoft
- CVE.org link
- CVE-2023-24936
- 影響
- 權限提高
- 最大嚴重性
- 中度
- CVSS Source
- Microsoft
- 向量字串
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Metrics
- CVSS:3.1 7.5 / 6.5基本分數量度:7.5 / 時間分數量度: 6.5
攻擊媒介
網路
攻擊複雜性
高
權限要求
無
使用者互動
必須
範圍
未變更
機密性
高
完整性
高
可用性
高
利用程式碼成熟度
未驗證
修復等級
官方修正程式
報告機密性
已確認
請參閱常見弱點評分系統,以取得有關這些量度定義的詳細資訊。
可擅用性
下列表格提供最初公開時此弱點的可擅用性評定。
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- 利用可能性低
常見問題集
成功利用此弱點的攻擊者可以獲得哪些權限?
成功利用此弱點的攻擊者可能會取得系統管理員權限。
根據 CVSS 量度,攻擊複雜性為高 (AC:H)。對於此弱點,這代表什麼意思?
攻擊者必須備妥目標環境以改善惡意探索可靠性,才能成功利用此弱點。
攻擊者如何利用此弱點?
攻擊者可能會引誘使用者開啟惡意的 XML 檔案,藉此利用弱點。
致謝
- H01 and H02 from FPT Software Cybersecurity Assurance Service with https://www.fpt-software.com/
安全性更新
若要了解您軟體的支援生命週期,請參閱 Microsoft 支援週期網站。
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 4.7.4050.0
- 3.0.6920.8954; 2.0.50727.8970
- 4.7.4050.0
- 3.0.6920.8954; 2.0.50727.8970
- 3.0.6920.8954; 2.0.50727.8970
- 10.0.10240.19983
- 10.0.10240.19983
- 4.8.9166.0
- 4.7.04043.0
- 4.7.4050.0
- 4.7.04043.0
- 4.7.4050.0
- 4.8.9166.0
- 4.8.9166.0
- 4.8.9166.0
- 4.7.04043.0
- 4.7.4050.0
- 4.8.9166.0
- 4.8.9166.0
- 4.7.04043.0
- 4.7.4050.0
- 4.8.9166.0
- 4.8.9166.0
- 4.8.9166.0
- 4.8.9166.0
- 4.8.9166.0
- 4.8.9166.0
- 4.7.04043.0
- 4.7.4050.0
- 4.7.04043.0
- 4.7.4050.0
- 4.7.04043.0
- 4.7.4050.0
- 4.7.04043.0
- 4.7.4050.0
- 4.7.04043.0
- 4.7.4050.0
- 4.7.04043.0
- 4.7.4050.0
- 10.0.14393.5989
- 10.0.14393.5989
- 10.0.14393.5989
- 10.0.14393.5989
- 4.7.4050.0
- 4.8.4644.0
免責聲明
修訂
Updated links to security updates. This is an informational change only.
Updated one or more CVSS scores for the affected products. This is an informational change only.
In the Security Updates table, added all supported versions of all supported versions of .NET Framework, Visual Studio 2022 version 17.0, Visual Studio 2022 version 17.2, and Visual Studio 2022 version 17.4 because these products are also affected by this vulnerability. Microsoft strongly recommends that customers running any of these products install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.
Revised the Security Updates table to include PowerShell 7.2 and PowerShell 7.3 because these versions of PowerShell 7 are affected by this vulnerability. See https://github.com/PowerShell/Announcements/issues/42 for more information.
Information published.