High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2025-21171
HighVulnerability Description
.NET Remote Code Execution Vulnerability
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Known Affected Software
57 configuration(s) from 1 vendor(s)
cpe:2.3:a:microsoft:visual_studio_2022:17.8.10:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:powershell:7.5:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.12:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.6:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.4:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.0:*:*:*:*:-:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.12.2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.13:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.3:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.18:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.15:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.11:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.20:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.19:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.12.3:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.10.5:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.21:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.4:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.3:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.16:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.10.4:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.10.3:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.10.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.10.7:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.14:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.7:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.5:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.6:*:*:*:*:-:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.5:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.12.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.10.2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.10:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.10.8:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.16:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.13:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.9:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.12:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.11:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.12.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.17:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.14:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.15:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.7:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.10.9:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.10.6:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.9:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.8.8:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.8:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.6.2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.10.1:*:*:*:*:*:*:*
2025-Jan-CVE-2025-21171
CVE-2025-21171: .NET Remote Code Execution Vulnerability
CVE-2025-21171
CVE-2025-21171
Severity Details
Weakness Type (CWE)
Heap-based Buffer Overflow
- Description
- A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Variant
Key Information
- Published Date
- January 14, 2025
