Changeflow GovPing Data Privacy & Cybersecurity Microsoft Developer Tools Multiple Vulnerabilit...
Priority review Guidance Added Final

Microsoft Developer Tools Multiple Vulnerabilities CVSS 7.8

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund published advisory WID-SEC-2026-1100 disclosing multiple vulnerabilities in Microsoft Visual Studio, .NET Framework, .NET, PowerShell, and Visual Studio Code. CVSS Base Score is 7.8 (high); CVSS Temporal Score is 6.8 (medium). Affected products span .NET Framework 3.5 through 10.0, PowerShell 7.4 and 7.5, Visual Studio 2017 through 2022, and Visual Studio Code CoPilot Chat Extension across Linux, macOS, and Windows platforms. An attacker could exploit these flaws to disclose confidential information, conduct spoofing attacks, cause denial-of-service conditions, bypass security measures, or potentially execute arbitrary code. Remote attack capability is noted as no.

Published by CERT-Bund on wid.cert-bund.de . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

What changed

CERT-Bund issued a security advisory documenting multiple vulnerabilities across Microsoft's developer tool ecosystem, affecting .NET Framework (versions 3.5 through 10.0), PowerShell (7.4, 7.5), Visual Studio (2017 through 2022), and Visual Studio Code CoPilot Chat Extension. Red Hat Enterprise Linux, Ubuntu Linux, and Oracle Linux are also listed as affected systems. The advisory carries a CVSS Base Score of 7.8 (high), indicating significant risk.

Organizations running any affected Microsoft development tools on Linux, macOS, or Windows should assess exposure, apply available mitigations or patches, and monitor for indicators of compromise. IT security teams should prioritize patching Visual Studio and .NET environments given the potential for arbitrary code execution.

Archived snapshot

Apr 17, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-1100] Microsoft DeveloperTools: Mehrere Schwachstellen CVSS Base Score 7.8 (hoch) CVSS Temporal Score 6.8 (mittel) Remoteangriff nein Datum 14.04.2026 Stand UPDATE 17.04.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • MacOS X
  • Windows

Produktbeschreibung

Microsoft Visual Studio ist eine integrierte Entwicklungsumgebung für Hochsprachen.
Microsoft .NET Framework ist eine Komponente des Microsoft Windows-Betriebssystems, das die Erstellung und Ausführung von Softwareanwendungen und Webdiensten ermöglicht. Es beinhaltet sowohl eine Laufzeitumgebung als auch ein Framework von Klassenbibliotheken (APIs), u. a. für die Programmiersprache ASP (ASP.NET), den Datenzugriff (ADO.NET), intelligente Clientanwendungen (Windows Forms) und weitere.
Microsoft .NET ist ein Software-Framework für die Entwicklung und Ausführung von Anwendungen.
PowerShell ist ein plattformübergreifendes Framework von Microsoft zur Automatisierung, Konfiguration und Verwaltung von Systemen, das einen Kommandozeileninterpreter inklusive Skriptsprache bietet.
Visual Studio Code ist ein Quelltext-Editor von Microsoft.

Produkte

UPDATE 16.04.2026
- Red Hat Enterprise Linux

  • Ubuntu Linux

  • Oracle Linux
    14.04.2026

  • Microsoft .NET Framework 4.8.1

  • Microsoft PowerShell 7.4

  • Microsoft .NET Framework 4.7.2

  • Microsoft .NET Framework 4.8

  • Microsoft .NET Framework 3.5

  • Microsoft .NET 10.0

  • Microsoft .NET 9.0

  • Microsoft .NET 8.0

  • Microsoft Visual Studio 2017 version 15.9 (includes 15.0-15.8)

  • Microsoft PowerShell 7.5

  • Microsoft Visual Studio Code CoPilot Chat Extension

  • Microsoft Visual Studio 2022 version 17.14

  • Microsoft Visual Studio 2022 version 17.12

  • Microsoft Visual Studio 2019 version 16.11 (includes 16.0-16.10)

  • Microsoft Visual Studio 2019 version 16.4 (includes 16.0-16.3)

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in Microsoft Visual Studio, Microsoft .NET Framework, Microsoft .NET, Microsoft PowerShell und Microsoft Visual Studio Code ausnutzen, um vertrauliche Informationen offenzulegen, Spoofing-Angriffe durchzuführen, einen Denial-of-Service-Zustand herbeizuführen oder Sicherheitsmaßnahmen zu umgehen, was möglicherweise die Ausführung von beliebigem Code ermöglicht. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
April 14th, 2026
Instrument
Guidance
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-1100

Who this affects

Applies to
Technology companies Manufacturers
Industry sector
5112 Software & Technology
Activity scope
Vulnerability remediation Patch management Development environment security
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software & Technology Data Privacy

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!