VYPR
High severityNVD Advisory· Published Jul 11, 2023· Updated Jan 1, 2025

.NET and Visual Studio Elevation of Privilege Vulnerability

CVE-2023-33127

Description

.NET and Visual Studio Elevation of Privilege Vulnerability

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An elevation of privilege vulnerability in .NET diagnostic server allows cross-session/cross-user code execution.

Vulnerability

Overview

CVE-2023-33127 is an elevation of privilege vulnerability in .NET and Visual Studio. The flaw resides in the diagnostic server component of .NET applications, which can be exploited to achieve cross-session and cross-user elevation of privilege (EoP) and remote code execution [1][2]. The vulnerability affects .NET 7.0 (versions 7.0.8 and earlier) and .NET 6.0 (versions 6.0.19 and earlier), including specific runtime packages for Windows desktops [1][2].

Exploitation

Details

The vulnerability does not require authentication to exploit, as the diagnostic server is exposed to other users on the same system. An attacker with low privileges on the local machine can leverage the diagnostic server's flaws to execute code in the context of another user or session [1][2]. Microsoft has not identified any mitigating factors for this vulnerability [1][2].

Impact

Successful exploitation allows an attacker to escalate privileges from a low-integrity context to a higher integrity level, potentially leading to full system compromise. The CVSS score is not provided in the references, but the advisory classifies this as an elevation of privilege vulnerability [3].

Mitigation

Microsoft released patches in .NET 7.0.9 and .NET 6.0.20, as well as updated Windows Desktop runtime packages for affected architectures [1][2]. Developers should update their .NET SDKs and runtime installations immediately. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog as of July 2023.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Microsoft.WindowsDesktop.App.Runtime.win-arm64NuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.WindowsDesktop.App.Runtime.win-arm64NuGet
>= 6.0.0, < 6.0.206.0.20
Microsoft.WindowsDesktop.App.Runtime.win-x64NuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.WindowsDesktop.App.Runtime.win-x64NuGet
>= 6.0.0, < 6.0.206.0.20
Microsoft.WindowsDesktop.App.Runtime.win-x86NuGet
>= 6.0.0, < 6.0.206.0.20
Microsoft.WindowsDesktop.App.Runtime.win-x86NuGet
>= 7.0.0, < 7.0.97.0.9

Affected products

13

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.