• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers uncover publisher spoofing bug in microsoft visual studio installer

Researchers Uncover Publisher Spoofing Bug in Microsoft Visual Studio Installer

You are here: Home / General Cyber Security News / Researchers Uncover Publisher Spoofing Bug in Microsoft Visual Studio Installer
June 12, 2023

Security researchers have warned about an “easily exploitable” flaw in the Microsoft Visible Studio installer that could be abused by a destructive actor to impersonate a legitimate publisher and distribute destructive extensions.

“A menace actor could impersonate a well-known publisher and issue a malicious extension to compromise a focused program,” Varonis researcher Dolev Taler mentioned. “Destructive extensions have been applied to steal delicate info, silently entry and transform code, or get full manage of a method.”

The vulnerability, which is tracked as CVE-2023-28299 (CVSS rating: 5.5), was dealt with by Microsoft as component of its Patch Tuesday updates for April 2023, describing it as a spoofing flaw.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The bug discovered by Varonis has to do with the Visual Studio user interface, which permits for spoofed publisher electronic signatures.

Precisely, it trivially bypasses a restriction that prevents consumers from moving into facts in the “products name” extension assets by opening a Visible Studio Extension (VSIX) bundle as a .ZIP file and then manually including newline people to the “DisplayName” tag in the “extension.vsixmanifest” file.

Microsoft Visual Studio

By introducing more than enough newline characters in the vsixmanifest file and adding fake “Electronic Signature” textual content, it was uncovered that warnings about the extension not remaining digitally signed could be very easily suppressed, thereby tricking a developer into installing it.

Forthcoming WEBINAR🔐 Mastering API Security: Knowledge Your Legitimate Attack Surface area

Uncover the untapped vulnerabilities in your API ecosystem and take proactive techniques in direction of ironclad security. Join our insightful webinar!

Sign up for the Session.wn-button,.wn-label,.wn-label:soon afterscreen:inline-block.examine_two_webinarmargin:20px 10px 30px 0background:#f9fbffcolor:#160755padding: 5%border:2px reliable #d9deffborder-radius:10pxtext-align:leftbox-shadow:10px 10px #e2ebff-webkit-border-major-remaining-radius:25px-moz-border-radius-topleft:25px-webkit-border-bottom-ideal-radius:25px-moz-border-radius-bottomright:25px.wn-labelfont-sizing:13pxmargin:20px 0font-excess weight:600letter-spacing:.6pxcolor:#596cec.wn-label:afterwidth:50pxheight:6pxcontent:”border-major:2px solid #d9deffmargin: 8px.wn-titlefont-size:21pxpadding:10px 0font-weight:900text-align:leftline-peak:33px.wn-descriptiontext-align:leftfont-size:15.6pxline-peak:26pxmargin:5px !importantcolor:#4e6a8d.wn-buttonpadding:6px 12pxborder-radius:5pxbackground-color:#4469f5font-dimensions:15pxcolor:#fff!importantborder:0line-top:inherittext-decoration:none!importantcursor:pointermargin:15px 20pxfloat:leftfont-bodyweight:500letter-spacing:.2px

In a hypothetical attack state of affairs, a bad actor could send a phishing email bearing the spoofed VSIX extension by camouflaging it as a genuine computer software update and, write-up-set up, gain a foothold into the focused machine.

The unauthorized access could then be utilized as a launchpad to obtain further manage of the network and aid the theft of sensitive information and facts.

“The low complexity and privileges expected make this exploit straightforward to weaponize,” Taler explained. “Threat actors could use this vulnerability to issue spoofed destructive extensions with the intention of compromising methods.”

Identified this posting exciting? Adhere to us on Twitter  and LinkedIn to study additional exceptional written content we publish.


Some sections of this article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Swiss Government Targeted by Series of Cyber-Attacks
Next Post: Data Flows Between UK and US to be Simplified Under New Agreement Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.