- Description
- Untrusted search path in .NET and Visual Studio allows an unauthorized attacker to execute code over a network.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 5.9
- Exploitability score
- 1.6
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- secure@microsoft.com
- CWE-426
- Hype score
- Not currently trending
🔴 SECURITY UPDATE - 08/07/2025 Critical CVE-2025-30399 exposes .NET and Visual Studio to RCE. Affects PowerShell 7.4 and 7.5. Immediate action required! ⚠️ Source: https://t.co/BRQWBlDvva
@kernyx64
8 Jul 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔴 #Microsoft NET, Remote Code Execution, #CVE-2025-30399 (Critical) https://t.co/uiABSPFS8U
@dailycve
11 Jun 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A8C2F8C1-F37A-4EE2-BBC3-53B0EDF070F7",
"versionEndExcluding": "17.8.22",
"versionStartIncluding": "17.8.0"
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6666F13E-6E1A-4FB3-9BB1-0BC0562BCAD9",
"versionEndExcluding": "17.10.16",
"versionStartIncluding": "17.10.0"
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E992833A-5B1E-4BE9-A722-C314F5AC94FB",
"versionEndExcluding": "17.12.9",
"versionStartIncluding": "17.12.0"
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FE1A759E-D531-40C8-BB96-362DEFE92F45",
"versionEndExcluding": "17.14.5",
"versionStartIncluding": "17.14.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FBA3FF1C-EEC2-41A0-A755-EC466625CA90",
"versionEndExcluding": "9.0.6",
"versionStartIncluding": "9.0.0"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5CCEDA7C-9C59-47B7-88A3-AC4034C9E400",
"versionEndExcluding": "8.0.17",
"versionStartIncluding": "8.0.0"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B39D1FC6-E8DF-41C8-B4EA-C7D1BBFB4700",
"versionEndExcluding": "7.4.11",
"versionStartIncluding": "7.4"
},
{
"criteria": "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C847962A-B049-415F-A24E-3A88F964BF8E",
"versionEndExcluding": "7.5.2",
"versionStartIncluding": "7.5"
}
],
"operator": "OR"
}
]
}
]