Vulnerability Description
ASP.NET and Visual Studio Security Feature Bypass Vulnerability
CVSS Score
8.1
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | .Net | >= 6.0.0, < 6.0.20 |
| Microsoft | Visual Studio 2022 | >= 17.0, < 17.0.23 |
| Fedoraproject | Fedora | 37 |
Related Weaknesses (CWE)
References
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170PatchVendor Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing List
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing List
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing List
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing List
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170PatchVendor Advisory
FAQ
What is CVE-2023-33170?
CVE-2023-33170 is a vulnerability with a CVSS score of 8.1 (HIGH). ASP.NET and Visual Studio Security Feature Bypass Vulnerability
How severe is CVE-2023-33170?
CVE-2023-33170 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-33170?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft .Net, Microsoft Visual Studio 2022, Fedoraproject Fedora.