CVE-2025-64660

8.0 HIGH

📋 TL;DR

This vulnerability allows an authorized attacker to execute arbitrary code remotely on systems running vulnerable versions of GitHub Copilot and Visual Studio Code. Attackers can exploit improper access controls to run malicious code over network connections. Users of affected software versions are at risk.

💻 Affected Systems

Products:
  • GitHub Copilot
  • Visual Studio Code
Versions: Specific versions not yet detailed in public advisory
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects standard installations with network connectivity enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to install malware, steal sensitive data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Attacker gains code execution within the IDE context, potentially accessing project files, credentials, and executing malicious commands.

🟢

If Mitigated

Limited impact with proper network segmentation, least privilege access, and security controls in place.

🌐 Internet-Facing: HIGH - Network-accessible attack surface allows remote exploitation.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authorized access but network-based execution lowers barrier.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Advisory for specific versions

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64660

Restart Required: Yes

Instructions:

1. Open Visual Studio Code
2. Go to Help > Check for Updates
3. Install available updates
4. Restart Visual Studio Code
5. For GitHub Copilot, ensure extension is updated to latest version

🔧 Temporary Workarounds

Disable Network Features

all

Disable network connectivity features in VS Code to prevent remote exploitation

Set 'remote.SSH.enable' to false in settings.json
Disable Live Share and other collaboration features

Network Segmentation

all

Restrict network access to development systems

Configure firewall to block inbound connections to VS Code ports
Use network policies to isolate development environments

🧯 If You Can't Patch

  • Isolate affected systems from production networks and internet
  • Implement strict access controls and monitor for suspicious network activity

🔍 How to Verify

Check if Vulnerable:

Check VS Code version and compare against patched versions in Microsoft advisory

Check Version:

code --version

Verify Fix Applied:

Verify VS Code version is updated to patched version and restart application

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections from VS Code process
  • Suspicious process execution originating from code.exe or VS Code

Network Indicators:

  • Unexpected outbound connections from development systems
  • Anomalous network traffic patterns from IDE applications

SIEM Query:

process_name:code.exe AND (network_connection:true OR process_execution:unusual)

🔗 References

📤 Share & Export