Microsoft Developer Tools Multiple Vulnerabilities CVSS 7.8
Summary
CERT-Bund published advisory WID-SEC-2026-1100 disclosing multiple vulnerabilities in Microsoft Visual Studio, .NET Framework, .NET, PowerShell, and Visual Studio Code. CVSS Base Score is 7.8 (high); CVSS Temporal Score is 6.8 (medium). Affected products span .NET Framework 3.5 through 10.0, PowerShell 7.4 and 7.5, Visual Studio 2017 through 2022, and Visual Studio Code CoPilot Chat Extension across Linux, macOS, and Windows platforms. An attacker could exploit these flaws to disclose confidential information, conduct spoofing attacks, cause denial-of-service conditions, bypass security measures, or potentially execute arbitrary code. Remote attack capability is noted as no.
What changed
CERT-Bund issued a security advisory documenting multiple vulnerabilities across Microsoft's developer tool ecosystem, affecting .NET Framework (versions 3.5 through 10.0), PowerShell (7.4, 7.5), Visual Studio (2017 through 2022), and Visual Studio Code CoPilot Chat Extension. Red Hat Enterprise Linux, Ubuntu Linux, and Oracle Linux are also listed as affected systems. The advisory carries a CVSS Base Score of 7.8 (high), indicating significant risk.
Organizations running any affected Microsoft development tools on Linux, macOS, or Windows should assess exposure, apply available mitigations or patches, and monitor for indicators of compromise. IT security teams should prioritize patching Visual Studio and .NET environments given the potential for arbitrary code execution.
Archived snapshot
Apr 17, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-1100] Microsoft DeveloperTools: Mehrere Schwachstellen CVSS Base Score 7.8 (hoch) CVSS Temporal Score 6.8 (mittel) Remoteangriff nein Datum 14.04.2026 Stand UPDATE 17.04.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- MacOS X
- Windows
Produktbeschreibung
Microsoft Visual Studio ist eine integrierte Entwicklungsumgebung für Hochsprachen.
Microsoft .NET Framework ist eine Komponente des Microsoft Windows-Betriebssystems, das die Erstellung und Ausführung von Softwareanwendungen und Webdiensten ermöglicht. Es beinhaltet sowohl eine Laufzeitumgebung als auch ein Framework von Klassenbibliotheken (APIs), u. a. für die Programmiersprache ASP (ASP.NET), den Datenzugriff (ADO.NET), intelligente Clientanwendungen (Windows Forms) und weitere.
Microsoft .NET ist ein Software-Framework für die Entwicklung und Ausführung von Anwendungen.
PowerShell ist ein plattformübergreifendes Framework von Microsoft zur Automatisierung, Konfiguration und Verwaltung von Systemen, das einen Kommandozeileninterpreter inklusive Skriptsprache bietet.
Visual Studio Code ist ein Quelltext-Editor von Microsoft.
Produkte
UPDATE 16.04.2026
- Red Hat Enterprise Linux
Ubuntu Linux
Oracle Linux
14.04.2026Microsoft .NET Framework 4.8.1
Microsoft PowerShell 7.4
Microsoft .NET Framework 4.7.2
Microsoft .NET Framework 4.8
Microsoft .NET Framework 3.5
Microsoft .NET 10.0
Microsoft .NET 9.0
Microsoft .NET 8.0
Microsoft Visual Studio 2017 version 15.9 (includes 15.0-15.8)
Microsoft PowerShell 7.5
Microsoft Visual Studio Code CoPilot Chat Extension
Microsoft Visual Studio 2022 version 17.14
Microsoft Visual Studio 2022 version 17.12
Microsoft Visual Studio 2019 version 16.11 (includes 16.0-16.10)
Microsoft Visual Studio 2019 version 16.4 (includes 16.0-16.3)
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in Microsoft Visual Studio, Microsoft .NET Framework, Microsoft .NET, Microsoft PowerShell und Microsoft Visual Studio Code ausnutzen, um vertrauliche Informationen offenzulegen, Spoofing-Angriffe durchzuführen, einen Denial-of-Service-Zustand herbeizuführen oder Sicherheitsmaßnahmen zu umgehen, was möglicherweise die Ausführung von beliebigem Code ermöglicht. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.