Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    NotesleuNotesleu
    Home»Threats»Vulnerability in Microsoft’s Visual Studio Code Opens Path for Extension Exploits, Password Theft

    Vulnerability in Microsoft’s Visual Studio Code Opens Path for Extension Exploits, Password Theft

    By NotesleuNo Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Reddit Copy Link

    A recently uncovered flaw in Microsoft’s Visual Studio Code (VS Code), a popular code editor and development platform, exposes stored authentication tokens to unauthorized access by malicious extensions on Windows, Linux, and macOS systems.

    The vulnerability, found by cybersecurity firm Cycode, concerns the ‘Secret Storage’ functionality within VS Code, where tokens are kept for integration with services such as Git, GitHub, and other programming interfaces. A breach of these tokens may lead to unauthorized system infiltration, data leaks, or other cybersecurity incidents for the affected organizations.

    Cycode’s researchers pinpointed the issue and developed a working proof-of-concept (PoC) to illustrate the flaw. Microsoft, however, declined to address the problem, reasoning that extensions within the platform are not meant to be isolated from the rest of the system environment.

    Manipulating Extensions to Extract Secrets

    The specific flaw at hand originates from the absence of proper isolation of authentication tokens in VS Code’s Secret Storage. The platform employs Keytar, a wrapper that communicates with credential managers on various operating systems, for storing tokens. Consequently, even malicious extensions can misuse this mechanism to gain access to stored tokens.

    Cycode’s Alex Ilgayev explained that aside from built-in GitHub and Microsoft authentication, all stored tokens in VS Code could be accessed by third-party extensions, including those associated with widely-used platforms such as Git, Azure, Docker/Kubernetes, CircleCI, GitLab, and AWS.

    Keychain containing login passwords
    Source: Cycode

    Upon detecting this vulnerability, the researchers conducted experiments by creating a malicious extension to steal CircleCI tokens, gradually developing a more flexible attack strategy without altering the existing extension’s code. The discovery that any VS Code extension could access the keychain formed the cornerstone of this new method.

    A Multi-faceted Issue

    Furthermore, Cycode’s research revealed that the tokens could be decrypted using a custom JavaScript script, as the encryption key was derived from easily attainable information like the executable path and machine ID.

    Additionally, a second flaw was identified where the ‘getFullKey’ function could be exploited, allowing attackers to impersonate other extensions and access their secure tokens.

    Reaction and Implications

    Cycode reported the findings to Microsoft two months prior, even showcasing their PoC extension. Despite these revelations, Microsoft’s development team chose not to see it as a security threat and continued with the existing design of VS Code’s secret storage management framework.

    This decision has raised questions and concerns among some cybersecurity experts, as the vulnerability leaves room for potential exploitation by malicious entities. The overall impact of this issue remains to be seen, but organizations relying on VS Code are urged to be vigilant and aware of the risks involved.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 98
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleUkraine Enhances Wartime Efforts Through Advanced Cyber Intelligence Strategies
    Next Article Massive Hack Targets Nearly 2,000 Citrix NetScaler Instances Exploiting Critical Vulnerability

    Related Posts

    Tech December 26, 2025

    “I Had a Dream” and Generative AI Jailbreaks

    December 26, 2025
    AI December 26, 2025

    Microsoft Unveils Security Copilot Early Access Program, Revolutionizing Threat Response

    December 26, 2025
    Cyber Attacks December 15, 2023

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    December 15, 2023
    Add A Comment
    Leave A Reply Cancel Reply

    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Popular Post

    Complete HTML Handwritten Notes

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    Advanced Python Mastery: For the Serious Developer

    Complete C++ Handwritten Notes From Basic to Advanced

    Google Introduces New Features Empowering Users to Manage Online Information

    © 2025 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.