CVE-2024-21409

📊 7.3 HIGH54.7%🎯 1 exploits
📅 Published Apr 9, 2024
📋 Status: Modified

.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

🎯 Affected Products & Systems

48 product configurations affected

Filter by type:
📱
Vulnerable
Version: 3.5
CPE:
cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*
📱
Vulnerable
Version: 4.8.1
CPE:
cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: ≥ 6.0.0 ∧ < 6.0.29
CPE:
cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: ≥ 7.0.0 ∧ < 7.0.18
CPE:
cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: ≥ 8.0.0 ∧ < 8.0.4
CPE:
cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: ≥ 7.2 ∧ < 7.2.19
CPE:
cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: ≥ 7.3 ∧ < 7.3.12
CPE:
cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: ≥ 7.4 ∧ < 7.4.2
CPE:
cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≥ 17.4.0 ∧ < 17.4.18
CPE:
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≥ 17.6.0 ∧ < 17.6.14
CPE:
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≥ 17.8.0 ∧ < 17.8.9
CPE:
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≥ 17.9.0 ∧ < 17.9.6
CPE:
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: 3.5
CPE:
cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*
📱
Vulnerable
Version: 4.7.2
CPE:
cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
📱
Vulnerable
Version: 4.8
CPE:
cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: r2
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: r2
CPE:
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 4.6.2
CPE:
cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 4.7
CPE:
cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*
📱
Vulnerable
Version: 4.7.1
CPE:
cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*
📱
Vulnerable
Version: 4.7.2
CPE:
cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: r2
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: r2
CPE:
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 3.5
CPE:
cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*
📱
Vulnerable
Version: 4.8
CPE:
cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*
📱
Vulnerable
Version: 4.6.2
CPE:
cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
💻
Operating System
Safe
Version: r2
Target HW: x64
CPE:
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
48 productsscroll for more
Metrics
7.3 HIGHCVSS v3.1[email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector:
LOCAL
Complexity:
LOW
Privileges:
LOW
User Interaction:
REQUIRED
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Modified
CVSS Details
7.3 (HIGH)v3.1
EPSS Details
54.7% (High)97.9th percentile
Last updated: Nov 1, 2025
Exploitation probability within 30 days
Published Date
Apr 9, 2024 (1 year ago)
Last Modified
Jan 17, 2025 (9 months ago)
Security Weaknesses2

Available exploits (1)

🔐 Sign-in Required

Sign in to view exploits and proof-of-concept code.

References3