
Cloud Vulnerability DB
A community-led vulnerabilities database
The Visual Studio Code Jupyter Extension Spoofing Vulnerability (CVE-2023-36018) was disclosed in November 2023. This vulnerability affects Visual Studio Code with Jupyter extension versions prior to 2023.10.1100000000. The vulnerability was assigned a CVSS v3.1 base score of 7.8 (HIGH) by Microsoft Corporation, while the NVD assigned it a more severe score of 9.8 (CRITICAL) (NVD).
The vulnerability is classified as a spoofing vulnerability that could allow code execution in the context of another Visual Studio Code user on the vulnerable system. The CVSS vector string assigned by Microsoft is CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access, low attack complexity, and high impacts on confidentiality, integrity, and availability (NVD).
If successfully exploited, this vulnerability could allow an attacker to execute code in the context of another Visual Studio Code user on the affected system, potentially leading to unauthorized access and privilege escalation (Qualys).
Microsoft has released a security update to address this vulnerability. Users are advised to upgrade to Visual Studio Code Jupyter extension version 2023.10.1100000000 or later to mitigate the risk (Qualys).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."