Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2025-29803 |
CWE-ID | CWE-427 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Microsoft SQL Server Management Studio Client/Desktop applications / Software for system administration Microsoft Visual Studio Tools for Applications Universal components / Libraries / Software for developers |
Vendor | Microsoft |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU107291
Risk: Medium
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2025-29803
CWE-ID:
CWE-427 - Uncontrolled Search Path Element
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to the application loads DLL libraries in an insecure manner within Visual Studio Tools for Applications and SQL Server Management Studio. A remote user can place a specially crafted .dll file and gain elevated privileges on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMicrosoft SQL Server Management Studio: 20.2
Microsoft Visual Studio Tools for Applications: 2019 - 2022
CPE2.3https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29803
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.