Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-36759

CVE-2023-36759: Visual Studio 2019 Privilege Escalation

CVE-2023-36759 is an elevation of privilege vulnerability in Microsoft Visual Studio 2019 that allows attackers to gain elevated system permissions. This article covers technical details, affected versions, and mitigation.

Published: January 28, 2026

CVE-2023-36759 Overview

CVE-2023-36759 is an Elevation of Privilege vulnerability affecting Microsoft Visual Studio 2019 and Visual Studio 2022. This vulnerability allows a local attacker with limited privileges to potentially escalate their access rights on affected systems. The flaw requires user interaction and specific conditions to be met for successful exploitation, making it a targeted attack vector rather than a mass-exploitation scenario.

Critical Impact

Local attackers can leverage this vulnerability to elevate privileges, potentially gaining higher-level access to the development environment and underlying system resources.

Affected Products

  • Microsoft Visual Studio 2019
  • Microsoft Visual Studio 2022

Discovery Timeline

  • September 12, 2023 - CVE-2023-36759 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2023-36759

Vulnerability Analysis

This elevation of privilege vulnerability is classified under CWE-822 (Untrusted Pointer Dereference), indicating that the underlying issue involves the application following a pointer reference that originates from an untrusted source. When exploited, this flaw can allow an attacker with low-level privileges on a local system to gain elevated access rights.

The vulnerability requires local access to the system, meaning an attacker must either have physical access or remote access through another vector such as an existing compromise or legitimate user credentials. Additionally, the exploitation scenario requires user interaction, indicating that a victim must perform some action (such as opening a specially crafted project or file) for the attack to succeed.

The impact of successful exploitation is significant across the confidentiality, integrity, and availability dimensions. An attacker who successfully elevates their privileges could potentially access sensitive source code, modify development artifacts, inject malicious code into builds, or disrupt development operations.

Root Cause

The vulnerability stems from an untrusted pointer dereference issue (CWE-822) within Visual Studio. This type of vulnerability occurs when the application follows a pointer reference that can be controlled or influenced by an attacker. In the context of Visual Studio, this could involve processing malicious project files, workspace configurations, or other development artifacts that contain crafted pointer values.

When Visual Studio dereferences these untrusted pointers without proper validation, it may execute unintended operations in a higher-privileged context, enabling the elevation of privilege attack.

Attack Vector

The attack vector for CVE-2023-36759 is local, requiring the attacker to have some level of access to the target system. The exploitation scenario involves the following conditions:

  1. The attacker must have low-privilege local access to a system running vulnerable versions of Visual Studio 2019 or 2022
  2. A legitimate user must interact with the system in a way that triggers the vulnerability (such as opening a malicious project)
  3. Due to the high attack complexity, specific conditions and timing must align for successful exploitation

The local nature of this vulnerability limits its exposure compared to network-accessible flaws, but it remains a significant concern in development environments where multiple users share systems or where attackers may already have limited access through other means.

Detection Methods for CVE-2023-36759

Indicators of Compromise

  • Unexpected privilege changes for Visual Studio processes or associated components
  • Unusual file access patterns in Visual Studio installation directories
  • Anomalous project files or workspace configurations being loaded from untrusted sources

Detection Strategies

  • Monitor Windows Security Event Logs for privilege escalation events (Event IDs 4672, 4673) involving devenv.exe or related Visual Studio processes
  • Implement application whitelisting and integrity monitoring for Visual Studio components
  • Deploy endpoint detection and response (EDR) solutions to detect anomalous behavior in development environments

Monitoring Recommendations

  • Enable detailed logging for Visual Studio activity and process execution
  • Monitor for unusual child processes spawned by Visual Studio with elevated privileges
  • Track file system changes in Visual Studio installation and project directories

How to Mitigate CVE-2023-36759

Immediate Actions Required

  • Update Microsoft Visual Studio 2019 and Visual Studio 2022 to the latest patched versions immediately
  • Review and restrict which users have access to development systems running Visual Studio
  • Avoid opening projects or solutions from untrusted sources until patches are applied
  • Consider temporarily disabling unused Visual Studio components or extensions

Patch Information

Microsoft has released security updates to address CVE-2023-36759. Organizations should apply the latest cumulative updates for Visual Studio 2019 and Visual Studio 2022 through the official Microsoft Update channels or the Visual Studio Installer. For detailed patch information and affected version specifics, refer to the Microsoft Security Response Center Advisory.

Workarounds

  • Restrict Visual Studio usage to trusted project files and solutions only
  • Implement network segmentation to isolate development environments from general user networks
  • Use the principle of least privilege for user accounts accessing Visual Studio
  • Consider running Visual Studio in a sandboxed or virtualized environment for untrusted projects

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechMicrosoft Visual Studio

  • SeverityMEDIUM

  • CVSS Score6.7

  • EPSS Probability0.33%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-822

  • NVD-CWE-noinfo
  • Vendor Resources
  • Microsoft CVE-2023-36759 Advisory
  • Related CVEs
  • CVE-2020-1133: Microsoft Visual Studio Privilege Escalation

  • CVE-2026-21257: Visual Studio 2022 Privilege Escalation

  • CVE-2025-49739: Visual Studio Privilege Escalation Flaw

  • CVE-2025-25003: Visual Studio 2019 Privilege Escalation
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English