Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/dotnet8-runtime@8.0.26-r0?arch=loongarch64&distroversion=edge&reponame=community
Typeapk
Namespacealpine
Namedotnet8-runtime
Version8.0.26-r0
Qualifiers
arch loongarch64
distroversion edge
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-cc3y-8y5n-v7cq
vulnerability_id VCID-cc3y-8y5n-v7cq
summary
Microsoft Security Advisory CVE-2026-26171 – .NET Denial of Service Vulnerability
## Executive Summary: 

Microsoft is releasing this security advisory to provide information about a vulnerability in System.Security.Cryptography.Xml. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in EncryptedXml class where uncontrolled resource consumption can give an attacker to the ability to perform a Denial of Service attack.

## Announcement

Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/xxxxx

## CVSS Details

- **Version:** 3.1
- **Severity:** High
- **Score:** 7.5
- **Vector:** 7.5: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H E:U/RL:O/RC:C
- **Weakness:** CWE-400 CWE-611: Uncontrolled Resource Consumption Improper Restriction of XML External Entity Reference

## Affected Platforms

- **Platforms:** All
- **Architectures:** All

## <a name="affected-packages"></a>Affected Packages
The vulnerability affects any Microsoft .NET project if it uses any of affected packages versions listed below

### <a name=".NET 10"></a>.NET 10
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Security.Cryptography.xml](https://www.nuget.org/packages/System.Security.Cryptography.Xml)               | >=10.0.0, <=10.0.5; | 10.0.6

### <a name=".NET 9"></a>.NET 9
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Security.Cryptography.xml](https://www.nuget.org/packages/System.Security.Cryptography.Xml)               | >=9.0.0, <=9.0.14; | 9.0.15

### <a name=".NET 8"></a>.NET 8
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Security.Cryptography.xml](https://www.nuget.org/packages/System.Security.Cryptography.Xml)               | >=8.0.0, <=8.0.2; | 8.0.3

## Advisory FAQ

### <a name="how-affected"></a>How do I know if I am affected?

If using an affected package listed in [affected packages](#affected-packages), you're exposed to the vulnerability.

### <a name="how-fix"></a>How do I fix the issue?

To update the Using the System.Security.Cryptography.Xml NuGet package, use one of the following methods:

NuGet Package Manager UI in Visual Studio:
- Open your project in Visual Studio.
- Right-click on your project in Solution Explorer and select "Manage NuGet Packages..." or navigate to "Project > Manage NuGet Packages".
- In the NuGet Package Manager window, select the "Updates" tab. This tab lists packages with available updates from your configured package sources.
- Select the package(s) you wish to update. You can choose a specific version from the dropdown or update to the latest available version.
- Click the "Update" button.

Using the NuGet Package Manager Console in Visual Studio:
- Open your project in Visual Studio.
- Navigate to "Tools > NuGet Package Manager > Package Manager Console".
- To update a specific package to its latest version, use the following Update-Package command:

```Update-Package -Id System.Security.Cryptography.xml```

Using the .NET CLI (Command Line Interface):
- Open a terminal or command prompt in your project's directory.
- To update a specific package to its latest version, use the following add package command:

```dotnet add package System.Security.Cryptography.Xml```

Once you have updated the nuget package reference you must recompile and deploy your application. Additionally we recommend you update your runtime and/or SDKs, but it is not necessary to patch the vulnerability.

## Other Information

### Reporting Security Issues

If you have found a potential security issue in a supported version of .NET, please report it to the Microsoft Security Response Center (MSRC) via the [MSRC Researcher Portal](https://msrc.microsoft.com/report/vulnerability/new). Further information can be found in the MSRC [Report an Issue FAQ](https://www.microsoft.com/msrc/faqs-report-an-issue).

Security reports made through MSRC may qualify for the Microsoft .NET Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.

### Support

You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.

### Disclaimer

The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

### External Links

[CVE-2026-26171](https://www.cve.org/CVERecord?id=CVE-2026-26171)

### Acknowledgements

Ludvig Pedersen

### Revisions

V1.0 (April 14, 2026): Advisory published.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-26171.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-26171.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-26171
reference_id
reference_type
scores
0
value 0.00529
scoring_system epss
scoring_elements 0.67248
published_at 2026-04-18T12:55:00Z
1
value 0.00589
scoring_system epss
scoring_elements 0.69204
published_at 2026-04-16T12:55:00Z
2
value 0.00762
scoring_system epss
scoring_elements 0.73401
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-26171
2
reference_url https://github.com/dotnet/announcements/issues/389
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/389
3
reference_url https://github.com/dotnet/runtime
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime
4
reference_url https://github.com/dotnet/runtime/security/advisories/GHSA-w3x6-4m5h-cxqf
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime/security/advisories/GHSA-w3x6-4m5h-cxqf
5
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26171
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value LOW
scoring_system generic_textual
scoring_elements
5
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-14T18:53:29Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26171
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-26171
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-26171
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457739
reference_id 2457739
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457739
8
reference_url https://github.com/advisories/GHSA-w3x6-4m5h-cxqf
reference_id GHSA-w3x6-4m5h-cxqf
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w3x6-4m5h-cxqf
9
reference_url https://access.redhat.com/errata/RHSA-2026:8467
reference_id RHSA-2026:8467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8467
10
reference_url https://access.redhat.com/errata/RHSA-2026:8468
reference_id RHSA-2026:8468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8468
11
reference_url https://access.redhat.com/errata/RHSA-2026:8469
reference_id RHSA-2026:8469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8469
12
reference_url https://access.redhat.com/errata/RHSA-2026:8470
reference_id RHSA-2026:8470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8470
13
reference_url https://access.redhat.com/errata/RHSA-2026:8471
reference_id RHSA-2026:8471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8471
14
reference_url https://access.redhat.com/errata/RHSA-2026:8472
reference_id RHSA-2026:8472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8472
15
reference_url https://access.redhat.com/errata/RHSA-2026:8473
reference_id RHSA-2026:8473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8473
16
reference_url https://access.redhat.com/errata/RHSA-2026:8474
reference_id RHSA-2026:8474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8474
17
reference_url https://access.redhat.com/errata/RHSA-2026:8475
reference_id RHSA-2026:8475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8475
18
reference_url https://usn.ubuntu.com/8176-1/
reference_id USN-8176-1
reference_type
scores
url https://usn.ubuntu.com/8176-1/
fixed_packages
0
url pkg:apk/alpine/dotnet8-runtime@8.0.26-r0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/dotnet8-runtime@8.0.26-r0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet8-runtime@8.0.26-r0%3Farch=loongarch64&distroversion=edge&reponame=community
aliases CVE-2026-26171, GHSA-w3x6-4m5h-cxqf
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cc3y-8y5n-v7cq
1
url VCID-kd36-kt84-1fcz
vulnerability_id VCID-kd36-kt84-1fcz
summary
Microsoft Security Advisory CVE-2026-33116 – .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
## Executive Summary: 

Microsoft is releasing this security advisory to provide information about a vulnerability in System.Security.Cryptography.Xml. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in EncryptedXml class where an attacker can cause an infinite loop and perform a Denial of Service attack.

## Announcement

Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/12345

## CVSS Details

- **Version:** 3.1
- **Severity:** High
- **Score:** 7.5
- **Vector:** 7.5 CVSS: 3.1AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
- **Weakness:** CWE-835 CWE-400 CWE-20: Loop with Unreachable Exit Condition ('Infinite Loop') Uncontrolled Resource Consumption Improper Input Validation

## Affected Platforms

- **Platforms:** All
- **Architectures:** All

## <a name="affected-packages"></a>Affected Packages
The vulnerability affects any Microsoft .NET project if it uses any of affected packages versions listed below

### <a name=".NET 10"></a>.NET 10
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Security.Cryptography.Xml](https://www.nuget.org/packages/System.Security.Cryptography.Xml)               | >=10.0.0, <=10.0.5 | 10.0.6

### <a name=".NET 9"></a>.NET 9
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Security.Cryptography.Xml](https://www.nuget.org/packages/System.Security.Cryptography.Xml)               | >=9.0.0, <=9.0.14 | 9.0.15

### <a name=".NET 8"></a>.NET 8
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Security.Cryptography.Xml](https://www.nuget.org/packages/System.Security.Cryptography.Xml)               | >=8.0.0, <=8.0.2 | 8.0.3

## Advisory FAQ

### <a name="how-affected"></a>How do I know if I am affected?

If using a package listed in [affected packages](#affected-packages), you're exposed to the vulnerability.

### <a name="how-fix"></a>How do I fix the issue?

To update the Using the System.Security.Cryptography.xml NuGet package, use one of the following methods:

NuGet Package Manager UI in Visual Studio:
- Open your project in Visual Studio.
- Right-click on your project in Solution Explorer and select "Manage NuGet Packages..." or navigate to "Project > Manage NuGet Packages".
- In the NuGet Package Manager window, select the "Updates" tab. This tab lists packages with available updates from your configured package sources.
- Select the package(s) you wish to update. You can choose a specific version from the dropdown or update to the latest available version.
- Click the "Update" button.

Using the NuGet Package Manager Console in Visual Studio:
- Open your project in Visual Studio.
- Navigate to "Tools > NuGet Package Manager > Package Manager Console".
- To update a specific package to its latest version, use the following Update-Package command:

```Update-Package -Id System.Security.Cryptography.xml```

Using the .NET CLI (Command Line Interface):
- Open a terminal or command prompt in your project's directory.
- To update a specific package to its latest version, use the following add package command:

```dotnet add package System.Security.Cryptography.xml```

Once you have updated the nuget package reference you must recompile and deploy your application. Additionally we recommend you update your runtime and/or SDKs, but it is not necessary to patch the vulnerability.

## Other Information

### Reporting Security Issues

If you have found a potential security issue in a supported version of .NET, please report it to the Microsoft Security Response Center (MSRC) via the [MSRC Researcher Portal](https://msrc.microsoft.com/report/vulnerability/new). Further information can be found in the MSRC [Report an Issue FAQ](https://www.microsoft.com/msrc/faqs-report-an-issue).

Security reports made through MSRC may qualify for the Microsoft .NET Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.

### Support

You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.

### Disclaimer

The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

### External Links

[CVE-2026-33116]( https://www.cve.org/CVERecord?id=CVE-2026-33116)

### Acknowledgements

Ludvig Pedersen

### Revisions

V1.0 (April 14, 2026): Advisory published.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33116.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33116.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33116
reference_id
reference_type
scores
0
value 0.00764
scoring_system epss
scoring_elements 0.73474
published_at 2026-04-18T12:55:00Z
1
value 0.00851
scoring_system epss
scoring_elements 0.74928
published_at 2026-04-16T12:55:00Z
2
value 0.00873
scoring_system epss
scoring_elements 0.7529
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33116
2
reference_url https://github.com/dotnet/announcements/issues/12345
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/12345
3
reference_url https://github.com/dotnet/announcements/issues/392
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/392
4
reference_url https://github.com/dotnet/runtime
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime
5
reference_url https://github.com/dotnet/runtime/security/advisories/GHSA-37gx-xxp4-5rgx
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime/security/advisories/GHSA-37gx-xxp4-5rgx
6
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33116
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value LOW
scoring_system generic_textual
scoring_elements
5
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-14T19:48:26Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33116
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-33116
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-33116
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457741
reference_id 2457741
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457741
9
reference_url https://github.com/advisories/GHSA-37gx-xxp4-5rgx
reference_id GHSA-37gx-xxp4-5rgx
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-37gx-xxp4-5rgx
10
reference_url https://access.redhat.com/errata/RHSA-2026:8467
reference_id RHSA-2026:8467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8467
11
reference_url https://access.redhat.com/errata/RHSA-2026:8468
reference_id RHSA-2026:8468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8468
12
reference_url https://access.redhat.com/errata/RHSA-2026:8469
reference_id RHSA-2026:8469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8469
13
reference_url https://access.redhat.com/errata/RHSA-2026:8470
reference_id RHSA-2026:8470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8470
14
reference_url https://access.redhat.com/errata/RHSA-2026:8471
reference_id RHSA-2026:8471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8471
15
reference_url https://access.redhat.com/errata/RHSA-2026:8472
reference_id RHSA-2026:8472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8472
16
reference_url https://access.redhat.com/errata/RHSA-2026:8473
reference_id RHSA-2026:8473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8473
17
reference_url https://access.redhat.com/errata/RHSA-2026:8474
reference_id RHSA-2026:8474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8474
18
reference_url https://access.redhat.com/errata/RHSA-2026:8475
reference_id RHSA-2026:8475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8475
19
reference_url https://usn.ubuntu.com/8176-1/
reference_id USN-8176-1
reference_type
scores
url https://usn.ubuntu.com/8176-1/
fixed_packages
0
url pkg:apk/alpine/dotnet8-runtime@8.0.26-r0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/dotnet8-runtime@8.0.26-r0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet8-runtime@8.0.26-r0%3Farch=loongarch64&distroversion=edge&reponame=community
aliases CVE-2026-33116, GHSA-37gx-xxp4-5rgx
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kd36-kt84-1fcz
2
url VCID-u6eh-1bec-n7c2
vulnerability_id VCID-u6eh-1bec-n7c2
summary
Microsoft Security Advisory CVE-2026-32178 – .NET Spoofing Vulnerability
## Executive Summary: 

Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0, .NET 9.0, and .NET 10.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in System.Net.Mail where specially crafted data allows an unauthorized attacker to perform a spoofing attack over the network.

## Announcement

Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/12345

## CVSS Details

- **Version:** 3.1
- **Severity:** High
- **Score:** 7.5
- **Vector:** 7.5: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
- **Weakness:** CWE-138: Improper Neutralization of Special Elements

## Affected Platforms

- **Platforms:** All
- **Architectures:** All

## <a name="affected-packages"></a>Affected Packages
The vulnerability affects any Microsoft .NET project if it uses any of affected package versions listed below


### <a name=".NET 8"></a>.NET 8
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm)               | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64)           | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm)     | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64)     | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64)               | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64)               | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64)                   | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)                   | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)               | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)                   | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)                   | >= 8.0.0, <= 8.0.25 | 8.0.26


### <a name=".NET 9"></a>.NET 9
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm)               | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64)           | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm)     | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64)     | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64)               | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64)               | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64)                   | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)                   | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)               | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)                   | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)                   | >= 9.0.0, <= 9.0.14 | 9.0.15

### <a name=".NET 10"></a>.NET 10
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm)               | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64)           | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm)     | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64)     | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64)               | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64)               | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64)                   | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)                   | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)               | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)                   | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)                   | >= 10.0.0, <= 10.0.5 | 10.0.6

## Advisory FAQ

### <a name="how-affected"></a>How do I know if I am affected?

If using a package listed in [affected packages](#affected-packages), you're exposed to the vulnerability.

### <a name="how-fix"></a>How do I fix the issue?

1. To fix the issue please install the latest version of .NET 8.0, NET 9.0, or .NET 10.0, as appropriate. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET  SDKs.
2. If your application references the vulnerable package, update the package reference to the patched version. You can list the versions you have installed by running the `dotnet --info` command.

Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.

Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.

## Other Information

### Reporting Security Issues

If you have found a potential security issue in a supported version of .NET, please report it to the Microsoft Security Response Center (MSRC) via the [MSRC Researcher Portal](https://msrc.microsoft.com/report/vulnerability/new). Further information can be found in the MSRC [Report an Issue FAQ](https://www.microsoft.com/msrc/faqs-report-an-issue).

Security reports made through MSRC may qualify for the Microsoft .NET Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.

### Support

You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.

### Disclaimer

The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

### External Links

[CVE-2026-32178]( https://www.cve.org/CVERecord?id=CVE-2026-32178)

### Acknowledgements

Ludvig Pedersen

### Revisions

V1.0 (April 14, 2026): Advisory published.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32178.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-32178
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13706
published_at 2026-04-21T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14612
published_at 2026-04-18T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16582
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-32178
2
reference_url https://github.com/dotnet/announcements/issues/12345
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/12345
3
reference_url https://github.com/dotnet/runtime
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime
4
reference_url https://github.com/dotnet/runtime/security/advisories/GHSA-vmwf-m9c5-3jvc
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime/security/advisories/GHSA-vmwf-m9c5-3jvc
5
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T10:40:37Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-32178
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-32178
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457781
reference_id 2457781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457781
8
reference_url https://github.com/advisories/GHSA-vmwf-m9c5-3jvc
reference_id GHSA-vmwf-m9c5-3jvc
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vmwf-m9c5-3jvc
9
reference_url https://access.redhat.com/errata/RHSA-2026:8467
reference_id RHSA-2026:8467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8467
10
reference_url https://access.redhat.com/errata/RHSA-2026:8468
reference_id RHSA-2026:8468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8468
11
reference_url https://access.redhat.com/errata/RHSA-2026:8469
reference_id RHSA-2026:8469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8469
12
reference_url https://access.redhat.com/errata/RHSA-2026:8470
reference_id RHSA-2026:8470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8470
13
reference_url https://access.redhat.com/errata/RHSA-2026:8471
reference_id RHSA-2026:8471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8471
14
reference_url https://access.redhat.com/errata/RHSA-2026:8472
reference_id RHSA-2026:8472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8472
15
reference_url https://access.redhat.com/errata/RHSA-2026:8473
reference_id RHSA-2026:8473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8473
16
reference_url https://access.redhat.com/errata/RHSA-2026:8474
reference_id RHSA-2026:8474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8474
17
reference_url https://access.redhat.com/errata/RHSA-2026:8475
reference_id RHSA-2026:8475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8475
18
reference_url https://usn.ubuntu.com/8176-1/
reference_id USN-8176-1
reference_type
scores
url https://usn.ubuntu.com/8176-1/
fixed_packages
0
url pkg:apk/alpine/dotnet8-runtime@8.0.26-r0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/dotnet8-runtime@8.0.26-r0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet8-runtime@8.0.26-r0%3Farch=loongarch64&distroversion=edge&reponame=community
aliases CVE-2026-32178, GHSA-vmwf-m9c5-3jvc
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u6eh-1bec-n7c2
3
url VCID-x5dp-ve72-r3h5
vulnerability_id VCID-x5dp-ve72-r3h5
summary
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-32202
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18852
published_at 2026-04-16T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18864
published_at 2026-04-18T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20919
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-32202
1
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202
reference_id CVE-2026-32202
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-14T19:31:55Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202
fixed_packages
0
url pkg:apk/alpine/dotnet8-runtime@8.0.26-r0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/dotnet8-runtime@8.0.26-r0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet8-runtime@8.0.26-r0%3Farch=loongarch64&distroversion=edge&reponame=community
aliases CVE-2026-32202
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5dp-ve72-r3h5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet8-runtime@8.0.26-r0%3Farch=loongarch64&distroversion=edge&reponame=community