Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/dotnet9-0-main@9.0.116-1?arch=hum1
Typerpm
Namespaceredhat
Namedotnet9-0-main
Version9.0.116-1
Qualifiers
arch hum1
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4zux-cmaa-w3gd
vulnerability_id VCID-4zux-cmaa-w3gd
summary
Microsoft.Build.Tasks.Core .NET Spoofing Vulnerability
# Microsoft Security Advisory CVE-2025-26646: .NET Spoofing Vulnerability

## <a name="executive-summary"></a>Executive summary

Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 9.0.xxx and .NET 8.0.xxx SDK. This advisory also provides guidance on what developers can do to update their applications to address this vulnerability.

A vulnerability exists in .NET SDK or MSBuild applications where external control of file name or path allows an unauthorized attacked to perform spoofing over a network.

## Announcement

Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/356

### <a name="mitigation-factors"></a>Mitigation factors

Projects which do not utilize the [DownloadFile](https://learn.microsoft.com/visualstudio/msbuild/downloadfile-task)  build task are not susceptible to this vulnerability.

## <a name="affected-software"></a>Affected software

* Any installation of .NET 9.0.105 SDK, .NET 9.0.203 SDK or earlier.
* Any installation of .NET 8.0.115 SDK, .NET 8.0.311 or .NET 8.0.312 SDK, .NET 8.0.408 or .NET 8.0.409 SDK or earlier.

## <a name="affected-packages"></a>Affected Packages
The vulnerability affects any Microsoft .NET Core project if it uses any of affected packages versions listed below

Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.Build.Tasks.Core](https://www.nuget.org/packages/Microsoft.Build.Tasks.Core) |>= 15.8.166, <=15.9.20<br />>=16.0.461, <= 16.11.0<br />>= 17.0.0, <= 17.8.3<br/>>= 17.9.5, <= 17.10.4<br />17.11.4<br />17.12.6 <br />17.13.9 | 15.9.30<br />16.11.6<br />17.8.29<br/>17.10.29<br />17.12.36<br />17.13.26 <br />17.14.8

## Advisory FAQ

### <a name="how-affected"></a>How do I know if I am affected?

If you have a .NET SDK with a version listed, or an affected package listed in [affected software](#affected-packages) or [affected packages](#affected-software), you're exposed to the vulnerability.

### <a name="how-fix"></a>How do I fix the issue?

1. To fix the issue please install the latest version of .NET 9.0 SDK or .NET 8.0 SDK. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET  SDKs.
2. If your application references the vulnerable package, update the package reference to the patched version.

* You can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;

```
.NET SDK:
 Version:           9.0.100
 Commit:            59db016f11
 Workload version:  9.0.100-manifests.3068a692
 MSBuild version:   17.12.7+5b8665660

Runtime Environment:
 OS Name:     Mac OS X
 OS Version:  15.2
 OS Platform: Darwin
 RID:         osx-arm64
 Base Path:   /usr/local/share/dotnet/sdk/9.0.100/

.NET workloads installed:
There are no installed workloads to display.
Configured to use loose manifests when installing new manifests.

Host:
  Version:      9.0.0
  Architecture: arm64
  Commit:       9d5a6a9aa4

.NET SDKs installed:
  9.0.100 [/usr/local/share/dotnet/sdk]

.NET runtimes installed:
  Microsoft.AspNetCore.App 9.0.0 [/usr/local/share/dotnet/shared/Microsoft.AspNetCore.App]
  Microsoft.NETCore.App 9.0.0 [/usr/local/share/dotnet/shared/Microsoft.NETCore.App]

Other architectures found:
  x64   [/usr/local/share/dotnet]
    registered at [/etc/dotnet/install_location_x64]

Environment variables:
  Not set

global.json file:
  Not found

Learn more:
  https://aka.ms/dotnet/info

Download .NET:
  https://aka.ms/dotnet/download
```

* If you're using .NET 9.0, you should download and install the appropriate SDK: `.NET 9.0.300` for Visual Studio 2022 v17.14, `.NET 9.0.204` for v17.13, or `.NET 9.0.106` for v17.12. Download from https://dotnet.microsoft.com/download/dotnet-core/9.0.

* If you're using .NET 8.0, you should download and install the appropriate SDK: `.NET 8.0.410` for Visual Studio 2022 v17.11, `.NET 8.0.313` for v17.10, or `.NET 8.0.116` for v17.8. Download from https://dotnet.microsoft.com/download/dotnet-core/8.0.

Once you have installed the updated SDK, restart your apps for the update to take effect.

## Other Information

### Reporting Security Issues

If you have found a potential security issue in .NET 8.0 or .NET 9.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.

### Support

You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/aspnetcore. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.

### Disclaimer

The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26646.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26646.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26646
reference_id
reference_type
scores
0
value 0.00236
scoring_system epss
scoring_elements 0.46352
published_at 2026-05-05T12:55:00Z
1
value 0.00236
scoring_system epss
scoring_elements 0.465
published_at 2026-04-26T12:55:00Z
2
value 0.00236
scoring_system epss
scoring_elements 0.46489
published_at 2026-04-24T12:55:00Z
3
value 0.00236
scoring_system epss
scoring_elements 0.46508
published_at 2026-04-21T12:55:00Z
4
value 0.00236
scoring_system epss
scoring_elements 0.46498
published_at 2026-04-12T12:55:00Z
5
value 0.00236
scoring_system epss
scoring_elements 0.46526
published_at 2026-04-11T12:55:00Z
6
value 0.00236
scoring_system epss
scoring_elements 0.46479
published_at 2026-04-02T12:55:00Z
7
value 0.00236
scoring_system epss
scoring_elements 0.46503
published_at 2026-04-09T12:55:00Z
8
value 0.00236
scoring_system epss
scoring_elements 0.46448
published_at 2026-04-29T12:55:00Z
9
value 0.00236
scoring_system epss
scoring_elements 0.46561
published_at 2026-04-18T12:55:00Z
10
value 0.00236
scoring_system epss
scoring_elements 0.46564
published_at 2026-04-16T12:55:00Z
11
value 0.00236
scoring_system epss
scoring_elements 0.46507
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26646
2
reference_url https://github.com/dotnet/announcements/issues/356
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/356
3
reference_url https://github.com/dotnet/msbuild
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/msbuild
4
reference_url https://github.com/dotnet/msbuild/issues/11846
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/msbuild/issues/11846
5
reference_url https://github.com/dotnet/msbuild/security/advisories/GHSA-h4j7-5rxr-p4wc
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/msbuild/security/advisories/GHSA-h4j7-5rxr-p4wc
6
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26646
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T15:57:11Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26646
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-26646
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-26646
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2365317
reference_id 2365317
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2365317
9
reference_url https://github.com/advisories/GHSA-h4j7-5rxr-p4wc
reference_id GHSA-h4j7-5rxr-p4wc
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h4j7-5rxr-p4wc
10
reference_url https://access.redhat.com/errata/RHSA-2025:7571
reference_id RHSA-2025:7571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7571
11
reference_url https://access.redhat.com/errata/RHSA-2025:7589
reference_id RHSA-2025:7589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7589
12
reference_url https://access.redhat.com/errata/RHSA-2025:7598
reference_id RHSA-2025:7598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7598
13
reference_url https://access.redhat.com/errata/RHSA-2025:7599
reference_id RHSA-2025:7599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7599
14
reference_url https://access.redhat.com/errata/RHSA-2025:7600
reference_id RHSA-2025:7600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7600
15
reference_url https://access.redhat.com/errata/RHSA-2025:7601
reference_id RHSA-2025:7601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7601
16
reference_url https://access.redhat.com/errata/RHSA-2025:7603
reference_id RHSA-2025:7603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7603
17
reference_url https://access.redhat.com/errata/RHSA-2026:9080
reference_id RHSA-2026:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9080
18
reference_url https://access.redhat.com/errata/RHSA-2026:9205
reference_id RHSA-2026:9205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9205
19
reference_url https://usn.ubuntu.com/7509-1/
reference_id USN-7509-1
reference_type
scores
url https://usn.ubuntu.com/7509-1/
fixed_packages
aliases CVE-2025-26646, GHSA-h4j7-5rxr-p4wc
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4zux-cmaa-w3gd
1
url VCID-cc3y-8y5n-v7cq
vulnerability_id VCID-cc3y-8y5n-v7cq
summary
Microsoft Security Advisory CVE-2026-26171 – .NET Denial of Service Vulnerability
## Executive Summary: 

Microsoft is releasing this security advisory to provide information about a vulnerability in System.Security.Cryptography.Xml. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in EncryptedXml class where uncontrolled resource consumption can give an attacker to the ability to perform a Denial of Service attack.

## Announcement

Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/xxxxx

## CVSS Details

- **Version:** 3.1
- **Severity:** High
- **Score:** 7.5
- **Vector:** 7.5: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H E:U/RL:O/RC:C
- **Weakness:** CWE-400 CWE-611: Uncontrolled Resource Consumption Improper Restriction of XML External Entity Reference

## Affected Platforms

- **Platforms:** All
- **Architectures:** All

## <a name="affected-packages"></a>Affected Packages
The vulnerability affects any Microsoft .NET project if it uses any of affected packages versions listed below

### <a name=".NET 10"></a>.NET 10
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Security.Cryptography.xml](https://www.nuget.org/packages/System.Security.Cryptography.Xml)               | >=10.0.0, <=10.0.5; | 10.0.6

### <a name=".NET 9"></a>.NET 9
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Security.Cryptography.xml](https://www.nuget.org/packages/System.Security.Cryptography.Xml)               | >=9.0.0, <=9.0.14; | 9.0.15

### <a name=".NET 8"></a>.NET 8
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Security.Cryptography.xml](https://www.nuget.org/packages/System.Security.Cryptography.Xml)               | >=8.0.0, <=8.0.2; | 8.0.3

## Advisory FAQ

### <a name="how-affected"></a>How do I know if I am affected?

If using an affected package listed in [affected packages](#affected-packages), you're exposed to the vulnerability.

### <a name="how-fix"></a>How do I fix the issue?

To update the Using the System.Security.Cryptography.Xml NuGet package, use one of the following methods:

NuGet Package Manager UI in Visual Studio:
- Open your project in Visual Studio.
- Right-click on your project in Solution Explorer and select "Manage NuGet Packages..." or navigate to "Project > Manage NuGet Packages".
- In the NuGet Package Manager window, select the "Updates" tab. This tab lists packages with available updates from your configured package sources.
- Select the package(s) you wish to update. You can choose a specific version from the dropdown or update to the latest available version.
- Click the "Update" button.

Using the NuGet Package Manager Console in Visual Studio:
- Open your project in Visual Studio.
- Navigate to "Tools > NuGet Package Manager > Package Manager Console".
- To update a specific package to its latest version, use the following Update-Package command:

```Update-Package -Id System.Security.Cryptography.xml```

Using the .NET CLI (Command Line Interface):
- Open a terminal or command prompt in your project's directory.
- To update a specific package to its latest version, use the following add package command:

```dotnet add package System.Security.Cryptography.Xml```

Once you have updated the nuget package reference you must recompile and deploy your application. Additionally we recommend you update your runtime and/or SDKs, but it is not necessary to patch the vulnerability.

## Other Information

### Reporting Security Issues

If you have found a potential security issue in a supported version of .NET, please report it to the Microsoft Security Response Center (MSRC) via the [MSRC Researcher Portal](https://msrc.microsoft.com/report/vulnerability/new). Further information can be found in the MSRC [Report an Issue FAQ](https://www.microsoft.com/msrc/faqs-report-an-issue).

Security reports made through MSRC may qualify for the Microsoft .NET Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.

### Support

You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.

### Disclaimer

The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

### External Links

[CVE-2026-26171](https://www.cve.org/CVERecord?id=CVE-2026-26171)

### Acknowledgements

Ludvig Pedersen

### Revisions

V1.0 (April 14, 2026): Advisory published.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-26171.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-26171.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-26171
reference_id
reference_type
scores
0
value 0.00504
scoring_system epss
scoring_elements 0.6622
published_at 2026-05-05T12:55:00Z
1
value 0.00504
scoring_system epss
scoring_elements 0.66241
published_at 2026-04-29T12:55:00Z
2
value 0.00504
scoring_system epss
scoring_elements 0.66242
published_at 2026-04-26T12:55:00Z
3
value 0.00504
scoring_system epss
scoring_elements 0.66229
published_at 2026-04-24T12:55:00Z
4
value 0.00529
scoring_system epss
scoring_elements 0.67248
published_at 2026-04-18T12:55:00Z
5
value 0.00589
scoring_system epss
scoring_elements 0.69204
published_at 2026-04-16T12:55:00Z
6
value 0.00762
scoring_system epss
scoring_elements 0.73401
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-26171
2
reference_url https://github.com/dotnet/announcements/issues/389
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/389
3
reference_url https://github.com/dotnet/runtime
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime
4
reference_url https://github.com/dotnet/runtime/security/advisories/GHSA-w3x6-4m5h-cxqf
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime/security/advisories/GHSA-w3x6-4m5h-cxqf
5
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26171
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value LOW
scoring_system generic_textual
scoring_elements
5
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-14T18:53:29Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26171
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-26171
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-26171
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457739
reference_id 2457739
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457739
8
reference_url https://github.com/advisories/GHSA-w3x6-4m5h-cxqf
reference_id GHSA-w3x6-4m5h-cxqf
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w3x6-4m5h-cxqf
9
reference_url https://access.redhat.com/errata/RHSA-2026:13280
reference_id RHSA-2026:13280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13280
10
reference_url https://access.redhat.com/errata/RHSA-2026:13281
reference_id RHSA-2026:13281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13281
11
reference_url https://access.redhat.com/errata/RHSA-2026:13282
reference_id RHSA-2026:13282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13282
12
reference_url https://access.redhat.com/errata/RHSA-2026:13283
reference_id RHSA-2026:13283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13283
13
reference_url https://access.redhat.com/errata/RHSA-2026:13693
reference_id RHSA-2026:13693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13693
14
reference_url https://access.redhat.com/errata/RHSA-2026:8467
reference_id RHSA-2026:8467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8467
15
reference_url https://access.redhat.com/errata/RHSA-2026:8468
reference_id RHSA-2026:8468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8468
16
reference_url https://access.redhat.com/errata/RHSA-2026:8469
reference_id RHSA-2026:8469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8469
17
reference_url https://access.redhat.com/errata/RHSA-2026:8470
reference_id RHSA-2026:8470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8470
18
reference_url https://access.redhat.com/errata/RHSA-2026:8471
reference_id RHSA-2026:8471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8471
19
reference_url https://access.redhat.com/errata/RHSA-2026:8472
reference_id RHSA-2026:8472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8472
20
reference_url https://access.redhat.com/errata/RHSA-2026:8473
reference_id RHSA-2026:8473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8473
21
reference_url https://access.redhat.com/errata/RHSA-2026:8474
reference_id RHSA-2026:8474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8474
22
reference_url https://access.redhat.com/errata/RHSA-2026:8475
reference_id RHSA-2026:8475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8475
23
reference_url https://access.redhat.com/errata/RHSA-2026:9077
reference_id RHSA-2026:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9077
24
reference_url https://access.redhat.com/errata/RHSA-2026:9080
reference_id RHSA-2026:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9080
25
reference_url https://access.redhat.com/errata/RHSA-2026:9205
reference_id RHSA-2026:9205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9205
26
reference_url https://usn.ubuntu.com/8176-1/
reference_id USN-8176-1
reference_type
scores
url https://usn.ubuntu.com/8176-1/
27
reference_url https://usn.ubuntu.com/8216-1/
reference_id USN-8216-1
reference_type
scores
url https://usn.ubuntu.com/8216-1/
fixed_packages
aliases CVE-2026-26171, GHSA-w3x6-4m5h-cxqf
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cc3y-8y5n-v7cq
2
url VCID-cju3-5hjk-h3d3
vulnerability_id VCID-cju3-5hjk-h3d3
summary
Microsoft Security Advisory CVE-2025-55315: .NET Security Feature Bypass Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET Core 10.0 , ASP.NET Core 9.0 , ASP.NET Core 8.0, and ASP.NET Core 2.3. This advisory also provides guidance on what developers can do to update their applications to address this vulnerability.

Inconsistent interpretation of http requests ('http request/response smuggling') in ASP.NET Core allows an authorized attacker to bypass a security feature over a network.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55315.json
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55315.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-55315
reference_id
reference_type
scores
0
value 0.00205
scoring_system epss
scoring_elements 0.42672
published_at 2026-04-04T12:55:00Z
1
value 0.00205
scoring_system epss
scoring_elements 0.42645
published_at 2026-04-02T12:55:00Z
2
value 0.01104
scoring_system epss
scoring_elements 0.78068
published_at 2026-04-08T12:55:00Z
3
value 0.01104
scoring_system epss
scoring_elements 0.78042
published_at 2026-04-07T12:55:00Z
4
value 0.01284
scoring_system epss
scoring_elements 0.79642
published_at 2026-04-21T12:55:00Z
5
value 0.01284
scoring_system epss
scoring_elements 0.79639
published_at 2026-04-18T12:55:00Z
6
value 0.01284
scoring_system epss
scoring_elements 0.7964
published_at 2026-04-16T12:55:00Z
7
value 0.01284
scoring_system epss
scoring_elements 0.79612
published_at 2026-04-09T12:55:00Z
8
value 0.01284
scoring_system epss
scoring_elements 0.79711
published_at 2026-05-05T12:55:00Z
9
value 0.01284
scoring_system epss
scoring_elements 0.79695
published_at 2026-04-29T12:55:00Z
10
value 0.01284
scoring_system epss
scoring_elements 0.79679
published_at 2026-04-26T12:55:00Z
11
value 0.01284
scoring_system epss
scoring_elements 0.79673
published_at 2026-04-24T12:55:00Z
12
value 0.01284
scoring_system epss
scoring_elements 0.79609
published_at 2026-04-13T12:55:00Z
13
value 0.01284
scoring_system epss
scoring_elements 0.79617
published_at 2026-04-12T12:55:00Z
14
value 0.01284
scoring_system epss
scoring_elements 0.79633
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-55315
2
reference_url https://github.com/dotnet/announcements/issues/371
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/371
3
reference_url https://github.com/dotnet/aspnetcore
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/aspnetcore
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403085
reference_id 2403085
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403085
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/52492.py
reference_id CVE-2025-55315
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/52492.py
6
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315
reference_id CVE-2025-55315
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-10-28T12:57:54Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-55315
reference_id CVE-2025-55315
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-55315
8
reference_url https://github.com/advisories/GHSA-5rrx-jjjq-q2r5
reference_id GHSA-5rrx-jjjq-q2r5
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5rrx-jjjq-q2r5
9
reference_url https://github.com/dotnet/aspnetcore/security/advisories/GHSA-5rrx-jjjq-q2r5
reference_id GHSA-5rrx-jjjq-q2r5
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/aspnetcore/security/advisories/GHSA-5rrx-jjjq-q2r5
10
reference_url https://access.redhat.com/errata/RHSA-2025:18148
reference_id RHSA-2025:18148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18148
11
reference_url https://access.redhat.com/errata/RHSA-2025:18149
reference_id RHSA-2025:18149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18149
12
reference_url https://access.redhat.com/errata/RHSA-2025:18150
reference_id RHSA-2025:18150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18150
13
reference_url https://access.redhat.com/errata/RHSA-2025:18151
reference_id RHSA-2025:18151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18151
14
reference_url https://access.redhat.com/errata/RHSA-2025:18152
reference_id RHSA-2025:18152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18152
15
reference_url https://access.redhat.com/errata/RHSA-2025:18153
reference_id RHSA-2025:18153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18153
16
reference_url https://access.redhat.com/errata/RHSA-2025:18256
reference_id RHSA-2025:18256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18256
17
reference_url https://access.redhat.com/errata/RHSA-2025:23225
reference_id RHSA-2025:23225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23225
18
reference_url https://access.redhat.com/errata/RHSA-2026:9080
reference_id RHSA-2026:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9080
19
reference_url https://access.redhat.com/errata/RHSA-2026:9205
reference_id RHSA-2026:9205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9205
20
reference_url https://usn.ubuntu.com/7822-1/
reference_id USN-7822-1
reference_type
scores
url https://usn.ubuntu.com/7822-1/
fixed_packages
aliases CVE-2025-55315, GHSA-5rrx-jjjq-q2r5
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cju3-5hjk-h3d3
3
url VCID-hrdk-wnbt-cyes
vulnerability_id VCID-hrdk-wnbt-cyes
summary
Microsoft Security Advisory CVE-2025-55247 | .NET Denial of Service Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0.xxx, .NET 9.0.xxx and .NET 10.0.xxx. This advisory also provides guidance on what developers can do to update their environments to remove this vulnerability.

A vulnerability exists in .NET where predictable paths for MSBuild's temporary directories on Linux let another user create the directories ahead of MSBuild, leading to DoS of builds. This only affects .NET on Linux operating systems.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55247.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55247.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-55247
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03027
published_at 2026-05-05T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02975
published_at 2026-04-07T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02977
published_at 2026-04-08T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03002
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02964
published_at 2026-04-11T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02941
published_at 2026-04-12T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02931
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02906
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02915
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03033
published_at 2026-04-21T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03031
published_at 2026-04-24T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.0302
published_at 2026-04-26T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.03065
published_at 2026-04-29T12:55:00Z
13
value 0.00015
scoring_system epss
scoring_elements 0.02953
published_at 2026-04-02T12:55:00Z
14
value 0.00015
scoring_system epss
scoring_elements 0.02968
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-55247
2
reference_url https://github.com/dotnet/msbuild
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/msbuild
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403086
reference_id 2403086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403086
4
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247
reference_id CVE-2025-55247
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-15T13:49:15Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-55247
reference_id CVE-2025-55247
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-55247
6
reference_url https://github.com/advisories/GHSA-w3q9-fxm7-j8fq
reference_id GHSA-w3q9-fxm7-j8fq
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w3q9-fxm7-j8fq
7
reference_url https://github.com/dotnet/msbuild/security/advisories/GHSA-w3q9-fxm7-j8fq
reference_id GHSA-w3q9-fxm7-j8fq
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/msbuild/security/advisories/GHSA-w3q9-fxm7-j8fq
8
reference_url https://access.redhat.com/errata/RHSA-2025:18148
reference_id RHSA-2025:18148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18148
9
reference_url https://access.redhat.com/errata/RHSA-2025:18149
reference_id RHSA-2025:18149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18149
10
reference_url https://access.redhat.com/errata/RHSA-2025:18150
reference_id RHSA-2025:18150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18150
11
reference_url https://access.redhat.com/errata/RHSA-2025:18151
reference_id RHSA-2025:18151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18151
12
reference_url https://access.redhat.com/errata/RHSA-2025:18152
reference_id RHSA-2025:18152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18152
13
reference_url https://access.redhat.com/errata/RHSA-2025:18153
reference_id RHSA-2025:18153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18153
14
reference_url https://access.redhat.com/errata/RHSA-2025:18256
reference_id RHSA-2025:18256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18256
15
reference_url https://access.redhat.com/errata/RHSA-2025:23225
reference_id RHSA-2025:23225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23225
16
reference_url https://access.redhat.com/errata/RHSA-2026:9080
reference_id RHSA-2026:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9080
17
reference_url https://access.redhat.com/errata/RHSA-2026:9205
reference_id RHSA-2026:9205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9205
18
reference_url https://usn.ubuntu.com/7822-1/
reference_id USN-7822-1
reference_type
scores
url https://usn.ubuntu.com/7822-1/
fixed_packages
aliases CVE-2025-55247, GHSA-w3q9-fxm7-j8fq
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hrdk-wnbt-cyes
4
url VCID-hrem-hhst-97en
vulnerability_id VCID-hrem-hhst-97en
summary dotnet: .NET: Denial of Service via stack overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32203.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32203.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-32203
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.302
published_at 2026-05-05T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30702
published_at 2026-04-21T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30538
published_at 2026-04-24T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30421
published_at 2026-04-26T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30339
published_at 2026-04-29T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.34031
published_at 2026-04-18T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.34043
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-32203
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457740
reference_id 2457740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457740
3
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32203
reference_id CVE-2026-32203
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T10:41:37Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32203
4
reference_url https://access.redhat.com/errata/RHSA-2026:13280
reference_id RHSA-2026:13280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13280
5
reference_url https://access.redhat.com/errata/RHSA-2026:13281
reference_id RHSA-2026:13281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13281
6
reference_url https://access.redhat.com/errata/RHSA-2026:13282
reference_id RHSA-2026:13282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13282
7
reference_url https://access.redhat.com/errata/RHSA-2026:13283
reference_id RHSA-2026:13283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13283
8
reference_url https://access.redhat.com/errata/RHSA-2026:13693
reference_id RHSA-2026:13693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13693
9
reference_url https://access.redhat.com/errata/RHSA-2026:8467
reference_id RHSA-2026:8467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8467
10
reference_url https://access.redhat.com/errata/RHSA-2026:8468
reference_id RHSA-2026:8468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8468
11
reference_url https://access.redhat.com/errata/RHSA-2026:8469
reference_id RHSA-2026:8469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8469
12
reference_url https://access.redhat.com/errata/RHSA-2026:8470
reference_id RHSA-2026:8470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8470
13
reference_url https://access.redhat.com/errata/RHSA-2026:8471
reference_id RHSA-2026:8471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8471
14
reference_url https://access.redhat.com/errata/RHSA-2026:8472
reference_id RHSA-2026:8472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8472
15
reference_url https://access.redhat.com/errata/RHSA-2026:8473
reference_id RHSA-2026:8473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8473
16
reference_url https://access.redhat.com/errata/RHSA-2026:8474
reference_id RHSA-2026:8474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8474
17
reference_url https://access.redhat.com/errata/RHSA-2026:8475
reference_id RHSA-2026:8475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8475
18
reference_url https://access.redhat.com/errata/RHSA-2026:9077
reference_id RHSA-2026:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9077
19
reference_url https://access.redhat.com/errata/RHSA-2026:9080
reference_id RHSA-2026:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9080
20
reference_url https://access.redhat.com/errata/RHSA-2026:9205
reference_id RHSA-2026:9205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9205
21
reference_url https://usn.ubuntu.com/8176-1/
reference_id USN-8176-1
reference_type
scores
url https://usn.ubuntu.com/8176-1/
22
reference_url https://usn.ubuntu.com/8216-1/
reference_id USN-8216-1
reference_type
scores
url https://usn.ubuntu.com/8216-1/
fixed_packages
aliases CVE-2026-32203
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hrem-hhst-97en
5
url VCID-k3fx-jcj4-jfc6
vulnerability_id VCID-k3fx-jcj4-jfc6
summary
Microsoft Security Advisory CVE-2025-55248: .NET Information Disclosure Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0 and .NET 9.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A MITM (man in the middle) attacker may prevent use of TLS between client and SMTP server, forcing client to send data over unencrypted connection.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55248.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55248.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-55248
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07306
published_at 2026-05-05T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07293
published_at 2026-04-29T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07319
published_at 2026-04-26T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07301
published_at 2026-04-08T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07313
published_at 2026-04-24T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07326
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07268
published_at 2026-04-04T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07246
published_at 2026-04-07T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07327
published_at 2026-04-09T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07356
published_at 2026-04-21T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07234
published_at 2026-04-16T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07304
published_at 2026-04-13T12:55:00Z
12
value 0.00026
scoring_system epss
scoring_elements 0.07223
published_at 2026-04-02T12:55:00Z
13
value 0.00029
scoring_system epss
scoring_elements 0.08003
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-55248
2
reference_url https://github.com/dotnet/announcements/issues/372
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/372
3
reference_url https://github.com/dotnet/runtime
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime
4
reference_url https://github.com/dotnet/runtime/issues/120713
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime/issues/120713
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403083
reference_id 2403083
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403083
6
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248
reference_id CVE-2025-55248
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T19:18:38Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-55248
reference_id CVE-2025-55248
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2025-55248
8
reference_url https://github.com/advisories/GHSA-gwq6-fmvp-qp68
reference_id GHSA-gwq6-fmvp-qp68
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gwq6-fmvp-qp68
9
reference_url https://github.com/dotnet/runtime/security/advisories/GHSA-gwq6-fmvp-qp68
reference_id GHSA-gwq6-fmvp-qp68
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime/security/advisories/GHSA-gwq6-fmvp-qp68
10
reference_url https://access.redhat.com/errata/RHSA-2025:18148
reference_id RHSA-2025:18148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18148
11
reference_url https://access.redhat.com/errata/RHSA-2025:18149
reference_id RHSA-2025:18149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18149
12
reference_url https://access.redhat.com/errata/RHSA-2025:18150
reference_id RHSA-2025:18150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18150
13
reference_url https://access.redhat.com/errata/RHSA-2025:18151
reference_id RHSA-2025:18151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18151
14
reference_url https://access.redhat.com/errata/RHSA-2025:18152
reference_id RHSA-2025:18152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18152
15
reference_url https://access.redhat.com/errata/RHSA-2025:18153
reference_id RHSA-2025:18153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18153
16
reference_url https://access.redhat.com/errata/RHSA-2025:18256
reference_id RHSA-2025:18256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18256
17
reference_url https://access.redhat.com/errata/RHSA-2025:23225
reference_id RHSA-2025:23225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23225
18
reference_url https://access.redhat.com/errata/RHSA-2026:9080
reference_id RHSA-2026:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9080
19
reference_url https://access.redhat.com/errata/RHSA-2026:9205
reference_id RHSA-2026:9205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9205
20
reference_url https://usn.ubuntu.com/7822-1/
reference_id USN-7822-1
reference_type
scores
url https://usn.ubuntu.com/7822-1/
fixed_packages
aliases CVE-2025-55248, GHSA-gwq6-fmvp-qp68
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3fx-jcj4-jfc6
6
url VCID-kd36-kt84-1fcz
vulnerability_id VCID-kd36-kt84-1fcz
summary
Microsoft Security Advisory CVE-2026-33116 – .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
## Executive Summary: 

Microsoft is releasing this security advisory to provide information about a vulnerability in System.Security.Cryptography.Xml. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in EncryptedXml class where an attacker can cause an infinite loop and perform a Denial of Service attack.

## Announcement

Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/12345

## CVSS Details

- **Version:** 3.1
- **Severity:** High
- **Score:** 7.5
- **Vector:** 7.5 CVSS: 3.1AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
- **Weakness:** CWE-835 CWE-400 CWE-20: Loop with Unreachable Exit Condition ('Infinite Loop') Uncontrolled Resource Consumption Improper Input Validation

## Affected Platforms

- **Platforms:** All
- **Architectures:** All

## <a name="affected-packages"></a>Affected Packages
The vulnerability affects any Microsoft .NET project if it uses any of affected packages versions listed below

### <a name=".NET 10"></a>.NET 10
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Security.Cryptography.Xml](https://www.nuget.org/packages/System.Security.Cryptography.Xml)               | >=10.0.0, <=10.0.5 | 10.0.6

### <a name=".NET 9"></a>.NET 9
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Security.Cryptography.Xml](https://www.nuget.org/packages/System.Security.Cryptography.Xml)               | >=9.0.0, <=9.0.14 | 9.0.15

### <a name=".NET 8"></a>.NET 8
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[System.Security.Cryptography.Xml](https://www.nuget.org/packages/System.Security.Cryptography.Xml)               | >=8.0.0, <=8.0.2 | 8.0.3

## Advisory FAQ

### <a name="how-affected"></a>How do I know if I am affected?

If using a package listed in [affected packages](#affected-packages), you're exposed to the vulnerability.

### <a name="how-fix"></a>How do I fix the issue?

To update the Using the System.Security.Cryptography.xml NuGet package, use one of the following methods:

NuGet Package Manager UI in Visual Studio:
- Open your project in Visual Studio.
- Right-click on your project in Solution Explorer and select "Manage NuGet Packages..." or navigate to "Project > Manage NuGet Packages".
- In the NuGet Package Manager window, select the "Updates" tab. This tab lists packages with available updates from your configured package sources.
- Select the package(s) you wish to update. You can choose a specific version from the dropdown or update to the latest available version.
- Click the "Update" button.

Using the NuGet Package Manager Console in Visual Studio:
- Open your project in Visual Studio.
- Navigate to "Tools > NuGet Package Manager > Package Manager Console".
- To update a specific package to its latest version, use the following Update-Package command:

```Update-Package -Id System.Security.Cryptography.xml```

Using the .NET CLI (Command Line Interface):
- Open a terminal or command prompt in your project's directory.
- To update a specific package to its latest version, use the following add package command:

```dotnet add package System.Security.Cryptography.xml```

Once you have updated the nuget package reference you must recompile and deploy your application. Additionally we recommend you update your runtime and/or SDKs, but it is not necessary to patch the vulnerability.

## Other Information

### Reporting Security Issues

If you have found a potential security issue in a supported version of .NET, please report it to the Microsoft Security Response Center (MSRC) via the [MSRC Researcher Portal](https://msrc.microsoft.com/report/vulnerability/new). Further information can be found in the MSRC [Report an Issue FAQ](https://www.microsoft.com/msrc/faqs-report-an-issue).

Security reports made through MSRC may qualify for the Microsoft .NET Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.

### Support

You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.

### Disclaimer

The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

### External Links

[CVE-2026-33116]( https://www.cve.org/CVERecord?id=CVE-2026-33116)

### Acknowledgements

Ludvig Pedersen

### Revisions

V1.0 (April 14, 2026): Advisory published.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33116.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33116.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33116
reference_id
reference_type
scores
0
value 0.00764
scoring_system epss
scoring_elements 0.73474
published_at 2026-04-18T12:55:00Z
1
value 0.00784
scoring_system epss
scoring_elements 0.73838
published_at 2026-05-05T12:55:00Z
2
value 0.00784
scoring_system epss
scoring_elements 0.73845
published_at 2026-04-29T12:55:00Z
3
value 0.00784
scoring_system epss
scoring_elements 0.73835
published_at 2026-04-24T12:55:00Z
4
value 0.00851
scoring_system epss
scoring_elements 0.74928
published_at 2026-04-16T12:55:00Z
5
value 0.00873
scoring_system epss
scoring_elements 0.7529
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33116
2
reference_url https://github.com/dotnet/announcements/issues/12345
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/12345
3
reference_url https://github.com/dotnet/announcements/issues/392
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/392
4
reference_url https://github.com/dotnet/runtime
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime
5
reference_url https://github.com/dotnet/runtime/security/advisories/GHSA-37gx-xxp4-5rgx
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime/security/advisories/GHSA-37gx-xxp4-5rgx
6
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33116
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value LOW
scoring_system generic_textual
scoring_elements
5
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-14T19:48:26Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33116
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-33116
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-33116
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457741
reference_id 2457741
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457741
9
reference_url https://github.com/advisories/GHSA-37gx-xxp4-5rgx
reference_id GHSA-37gx-xxp4-5rgx
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-37gx-xxp4-5rgx
10
reference_url https://access.redhat.com/errata/RHSA-2026:13280
reference_id RHSA-2026:13280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13280
11
reference_url https://access.redhat.com/errata/RHSA-2026:13281
reference_id RHSA-2026:13281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13281
12
reference_url https://access.redhat.com/errata/RHSA-2026:13282
reference_id RHSA-2026:13282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13282
13
reference_url https://access.redhat.com/errata/RHSA-2026:13283
reference_id RHSA-2026:13283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13283
14
reference_url https://access.redhat.com/errata/RHSA-2026:13693
reference_id RHSA-2026:13693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13693
15
reference_url https://access.redhat.com/errata/RHSA-2026:8467
reference_id RHSA-2026:8467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8467
16
reference_url https://access.redhat.com/errata/RHSA-2026:8468
reference_id RHSA-2026:8468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8468
17
reference_url https://access.redhat.com/errata/RHSA-2026:8469
reference_id RHSA-2026:8469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8469
18
reference_url https://access.redhat.com/errata/RHSA-2026:8470
reference_id RHSA-2026:8470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8470
19
reference_url https://access.redhat.com/errata/RHSA-2026:8471
reference_id RHSA-2026:8471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8471
20
reference_url https://access.redhat.com/errata/RHSA-2026:8472
reference_id RHSA-2026:8472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8472
21
reference_url https://access.redhat.com/errata/RHSA-2026:8473
reference_id RHSA-2026:8473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8473
22
reference_url https://access.redhat.com/errata/RHSA-2026:8474
reference_id RHSA-2026:8474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8474
23
reference_url https://access.redhat.com/errata/RHSA-2026:8475
reference_id RHSA-2026:8475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8475
24
reference_url https://access.redhat.com/errata/RHSA-2026:9077
reference_id RHSA-2026:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9077
25
reference_url https://access.redhat.com/errata/RHSA-2026:9080
reference_id RHSA-2026:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9080
26
reference_url https://access.redhat.com/errata/RHSA-2026:9205
reference_id RHSA-2026:9205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9205
27
reference_url https://usn.ubuntu.com/8176-1/
reference_id USN-8176-1
reference_type
scores
url https://usn.ubuntu.com/8176-1/
28
reference_url https://usn.ubuntu.com/8216-1/
reference_id USN-8216-1
reference_type
scores
url https://usn.ubuntu.com/8216-1/
fixed_packages
aliases CVE-2026-33116, GHSA-37gx-xxp4-5rgx
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kd36-kt84-1fcz
7
url VCID-u6eh-1bec-n7c2
vulnerability_id VCID-u6eh-1bec-n7c2
summary
Microsoft Security Advisory CVE-2026-32178 – .NET Spoofing Vulnerability
## Executive Summary: 

Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0, .NET 9.0, and .NET 10.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in System.Net.Mail where specially crafted data allows an unauthorized attacker to perform a spoofing attack over the network.

## Announcement

Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/12345

## CVSS Details

- **Version:** 3.1
- **Severity:** High
- **Score:** 7.5
- **Vector:** 7.5: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
- **Weakness:** CWE-138: Improper Neutralization of Special Elements

## Affected Platforms

- **Platforms:** All
- **Architectures:** All

## <a name="affected-packages"></a>Affected Packages
The vulnerability affects any Microsoft .NET project if it uses any of affected package versions listed below


### <a name=".NET 8"></a>.NET 8
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm)               | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64)           | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm)     | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64)     | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64)               | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64)               | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64)                   | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)                   | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)               | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)                   | >= 8.0.0, <= 8.0.25 | 8.0.26
[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)                   | >= 8.0.0, <= 8.0.25 | 8.0.26


### <a name=".NET 9"></a>.NET 9
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm)               | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64)           | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm)     | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64)     | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64)               | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64)               | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64)                   | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)                   | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)               | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)                   | >= 9.0.0, <= 9.0.14 | 9.0.15
[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)                   | >= 9.0.0, <= 9.0.14 | 9.0.15

### <a name=".NET 10"></a>.NET 10
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm)               | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64)           | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm)     | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64)     | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64)               | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64)               | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64)                   | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)                   | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)               | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)                   | >= 10.0.0, <= 10.0.5 | 10.0.6
[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)                   | >= 10.0.0, <= 10.0.5 | 10.0.6

## Advisory FAQ

### <a name="how-affected"></a>How do I know if I am affected?

If using a package listed in [affected packages](#affected-packages), you're exposed to the vulnerability.

### <a name="how-fix"></a>How do I fix the issue?

1. To fix the issue please install the latest version of .NET 8.0, NET 9.0, or .NET 10.0, as appropriate. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET  SDKs.
2. If your application references the vulnerable package, update the package reference to the patched version. You can list the versions you have installed by running the `dotnet --info` command.

Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.

Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.

## Other Information

### Reporting Security Issues

If you have found a potential security issue in a supported version of .NET, please report it to the Microsoft Security Response Center (MSRC) via the [MSRC Researcher Portal](https://msrc.microsoft.com/report/vulnerability/new). Further information can be found in the MSRC [Report an Issue FAQ](https://www.microsoft.com/msrc/faqs-report-an-issue).

Security reports made through MSRC may qualify for the Microsoft .NET Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.

### Support

You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.

### Disclaimer

The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

### External Links

[CVE-2026-32178]( https://www.cve.org/CVERecord?id=CVE-2026-32178)

### Acknowledgements

Ludvig Pedersen

### Revisions

V1.0 (April 14, 2026): Advisory published.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32178.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-32178
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.1202
published_at 2026-05-05T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12101
published_at 2026-04-29T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.1221
published_at 2026-04-26T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12244
published_at 2026-04-24T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13706
published_at 2026-04-21T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14612
published_at 2026-04-18T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16582
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-32178
2
reference_url https://github.com/dotnet/announcements/issues/12345
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/12345
3
reference_url https://github.com/dotnet/runtime
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime
4
reference_url https://github.com/dotnet/runtime/security/advisories/GHSA-vmwf-m9c5-3jvc
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime/security/advisories/GHSA-vmwf-m9c5-3jvc
5
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T10:40:37Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-32178
reference_id
reference_type
scores
0
value 0.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-32178
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457781
reference_id 2457781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457781
8
reference_url https://github.com/advisories/GHSA-vmwf-m9c5-3jvc
reference_id GHSA-vmwf-m9c5-3jvc
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vmwf-m9c5-3jvc
9
reference_url https://access.redhat.com/errata/RHSA-2026:13280
reference_id RHSA-2026:13280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13280
10
reference_url https://access.redhat.com/errata/RHSA-2026:13281
reference_id RHSA-2026:13281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13281
11
reference_url https://access.redhat.com/errata/RHSA-2026:13282
reference_id RHSA-2026:13282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13282
12
reference_url https://access.redhat.com/errata/RHSA-2026:13283
reference_id RHSA-2026:13283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13283
13
reference_url https://access.redhat.com/errata/RHSA-2026:13693
reference_id RHSA-2026:13693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13693
14
reference_url https://access.redhat.com/errata/RHSA-2026:8467
reference_id RHSA-2026:8467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8467
15
reference_url https://access.redhat.com/errata/RHSA-2026:8468
reference_id RHSA-2026:8468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8468
16
reference_url https://access.redhat.com/errata/RHSA-2026:8469
reference_id RHSA-2026:8469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8469
17
reference_url https://access.redhat.com/errata/RHSA-2026:8470
reference_id RHSA-2026:8470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8470
18
reference_url https://access.redhat.com/errata/RHSA-2026:8471
reference_id RHSA-2026:8471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8471
19
reference_url https://access.redhat.com/errata/RHSA-2026:8472
reference_id RHSA-2026:8472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8472
20
reference_url https://access.redhat.com/errata/RHSA-2026:8473
reference_id RHSA-2026:8473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8473
21
reference_url https://access.redhat.com/errata/RHSA-2026:8474
reference_id RHSA-2026:8474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8474
22
reference_url https://access.redhat.com/errata/RHSA-2026:8475
reference_id RHSA-2026:8475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8475
23
reference_url https://access.redhat.com/errata/RHSA-2026:9077
reference_id RHSA-2026:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9077
24
reference_url https://access.redhat.com/errata/RHSA-2026:9080
reference_id RHSA-2026:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9080
25
reference_url https://access.redhat.com/errata/RHSA-2026:9205
reference_id RHSA-2026:9205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9205
26
reference_url https://usn.ubuntu.com/8176-1/
reference_id USN-8176-1
reference_type
scores
url https://usn.ubuntu.com/8176-1/
27
reference_url https://usn.ubuntu.com/8216-1/
reference_id USN-8216-1
reference_type
scores
url https://usn.ubuntu.com/8216-1/
fixed_packages
aliases CVE-2026-32178, GHSA-vmwf-m9c5-3jvc
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u6eh-1bec-n7c2
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet9-0-main@9.0.116-1%3Farch=hum1