Search for vulnerabilities
Vulnerability details: VCID-r2x6-5yrp-aaaf
Vulnerability ID VCID-r2x6-5yrp-aaaf
Aliases CVE-2024-30045
GHSA-7fcr-8qw6-92fr
Summary .NET and Visual Studio Remote Code Execution Vulnerability
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 6.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-30045.json
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.00472 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.01534 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
epss 0.04612 https://api.first.org/data/v1/epss?cve=CVE-2024-30045
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-7fcr-8qw6-92fr
cvssv3.1 6.3 https://github.com/dotnet/announcements/issues/307
generic_textual MODERATE https://github.com/dotnet/announcements/issues/307
cvssv3.1 6.3 https://github.com/dotnet/runtime
cvssv3.1 7.5 https://github.com/dotnet/runtime
generic_textual HIGH https://github.com/dotnet/runtime
generic_textual MODERATE https://github.com/dotnet/runtime
cvssv3.1 6.3 https://github.com/dotnet/runtime/issues/102206
generic_textual MODERATE https://github.com/dotnet/runtime/issues/102206
cvssv3.1 6.3 https://github.com/dotnet/runtime/security/advisories/GHSA-7fcr-8qw6-92fr
cvssv3.1_qr MODERATE https://github.com/dotnet/runtime/security/advisories/GHSA-7fcr-8qw6-92fr
generic_textual MODERATE https://github.com/dotnet/runtime/security/advisories/GHSA-7fcr-8qw6-92fr
cvssv3.1 6.3 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045
cvssv3.1 6.3 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045
generic_textual MODERATE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045
ssvc Track https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045
cvssv3 6.3 https://nvd.nist.gov/vuln/detail/CVE-2024-30045
cvssv3.1 6.3 https://nvd.nist.gov/vuln/detail/CVE-2024-30045
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2024-30045
cvssv3.1 6.3 https://security.netapp.com/advisory/ntap-20241122-0001
generic_textual MODERATE https://security.netapp.com/advisory/ntap-20241122-0001
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-30045.json
https://api.first.org/data/v1/epss?cve=CVE-2024-30045
https://github.com/dotnet/announcements/issues/307
https://github.com/dotnet/runtime
https://github.com/dotnet/runtime/issues/102206
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045
https://security.netapp.com/advisory/ntap-20241122-0001
https://security.netapp.com/advisory/ntap-20241122-0001/
2279695 https://bugzilla.redhat.com/show_bug.cgi?id=2279695
cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net:8.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net:8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:powershell:7.4:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:powershell:7.4:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio:2022:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio:2022:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2022:17.4:*:*:*:*:*:*:*
CVE-2024-30045 https://nvd.nist.gov/vuln/detail/CVE-2024-30045
GHSA-7fcr-8qw6-92fr https://github.com/advisories/GHSA-7fcr-8qw6-92fr
GHSA-7fcr-8qw6-92fr https://github.com/dotnet/runtime/security/advisories/GHSA-7fcr-8qw6-92fr
RHSA-2024:2842 https://access.redhat.com/errata/RHSA-2024:2842
RHSA-2024:2843 https://access.redhat.com/errata/RHSA-2024:2843
RHSA-2024:3340 https://access.redhat.com/errata/RHSA-2024:3340
RHSA-2024:3345 https://access.redhat.com/errata/RHSA-2024:3345
USN-6773-1 https://usn.ubuntu.com/6773-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-30045.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/dotnet/announcements/issues/307
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/dotnet/runtime
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/dotnet/runtime
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/dotnet/runtime/issues/102206
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/dotnet/runtime/security/advisories/GHSA-7fcr-8qw6-92fr
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T17:32:06Z/ Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2024-30045
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2024-30045
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://security.netapp.com/advisory/ntap-20241122-0001
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.10859
EPSS Score 0.00043
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-05-17T12:42:20.558890+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2024-30045 34.0.0rc4