CVE-2022-26921

7.3 HIGH

📋 TL;DR

CVE-2022-26921 is an elevation of privilege vulnerability in Visual Studio Code that allows attackers to execute arbitrary code with higher privileges than intended. This affects users running Visual Studio Code on Windows systems where the application could be tricked into running malicious code with elevated permissions.

💻 Affected Systems

Products:
  • Visual Studio Code
Versions: Versions prior to 1.67.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations of Visual Studio Code. Linux and macOS versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains SYSTEM-level privileges, installs persistent malware, accesses sensitive data, and controls the entire Windows system.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malware, or access restricted files and system resources.

🟢

If Mitigated

Limited impact with proper user account controls, minimal privileges, and network segmentation preventing lateral movement.

🌐 Internet-Facing: LOW - This is primarily a local privilege escalation vulnerability requiring local access or user interaction.
🏢 Internal Only: MEDIUM - Internal users could exploit this to escalate privileges on workstations or development systems they have access to.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and user interaction. No publicly available exploit code has been confirmed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.67.0 and later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26921

Restart Required: Yes

Instructions:

1. Open Visual Studio Code. 2. Click Help > Check for Updates. 3. Install update to version 1.67.0 or later. 4. Restart Visual Studio Code when prompted.

🔧 Temporary Workarounds

Run with Limited Privileges

windows

Run Visual Studio Code with standard user privileges instead of administrative rights

Use Alternative Editors

all

Temporarily use alternative code editors until patching is complete

🧯 If You Can't Patch

  • Restrict Visual Studio Code usage to non-administrative accounts
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check Visual Studio Code version via Help > About. If version is below 1.67.0, the system is vulnerable.

Check Version:

code --version

Verify Fix Applied:

Verify Visual Studio Code version is 1.67.0 or higher via Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Visual Studio Code with elevated privileges
  • Windows Event Log entries showing privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from Visual Studio Code processes

SIEM Query:

Process Creation where Parent Process Name contains 'Code.exe' and Integrity Level changed

🔗 References

📤 Share & Export