Security Updates for Microsoft Visual Studio Products (May 2026)

high Nessus Plugin ID 314647

Synopsis

The Microsoft Visual Studio Products are affected by multiple vulnerabilities.

Description

The Microsoft Visual Studio Products are missing security updates. It is, therefore, affected by multiple vulnerabilities:

- Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate privileges locally. (CVE-2026-32177)

- A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system. However, an attacker would have limited control over the destination of the files and directories. To exploit the vulnerability, an attacker must send a specially crafted file to a vulnerable system. The security update fixes the vulnerability by ensuring .NET Core properly handles files. (CVE-2026-32175)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Microsoft has released the following security updates to address this issue:
- Update to 15.9.80 for Visual Studio 2017 15.9
- Update to 16.11.56 for Visual Studio 2019 16.11
- Update to 17.12.20 for Visual Studio 2022 17.12
- Update to 17.14.31 for Visual Studio 2022 17.14
- Update to 18.5.3 for Visual Studio 2026 18.5

See Also

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32175

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32177

https://learn.microsoft.com/en-us/visualstudio/releases/2019/history

http://www.nessus.org/u?f0f0c75d

Plugin Details

Severity: High

ID: 314647

File Name: smb_nt_ms26_may_visual_studio.nasl

Version: 1.3

Type: Local

Agent: windows

Published: 5/14/2026

Updated: 5/15/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:P

CVSS Score Source: CVE-2026-32177

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:visual_studio

Required KB Items: SMB/MS_Bulletin_Checks/Possible, installed_sw/Microsoft Visual Studio, SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Patch Publication Date: 5/12/2026

Vulnerability Publication Date: 5/12/2026

Reference Information

CVE: CVE-2026-32175, CVE-2026-32177

IAVA: 2026-A-0460, 2026-A-0463, 2026-A-0474