CVE-2021-24112: .NET Core Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 8.1)
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2021-Feb
Released
2021-02-09
Last Updated
2021-02-24
EPSS Score
1.11% (percentile: 78.1%)

FAQ

How could an attacker exploit this vulnerability? When a .NET application utilizing libgdiplus on a non-Windows system accepts input, an attacker could send a specially crafted request that could result in remote code execution. Does this vulnerability affect applications running on Windows? No, Windows utilizes GDI+ to process these requests, and is not affected by this vulnerability.

Affected Products (5)

Developer Tools

  • Visual Studio 2019 for Mac
  • Mono 6.12.0
  • .NET Core 2.1
  • .NET Core 3.1
  • .NET 5.0

Security Updates (5)

Revision History

  • 2021-02-09: Information published.
  • 2021-02-24: In the Security Updates table, added Visual Studio 2019 for Mac and Mono 6.12.0 because they are also affected by CVE-2021-24112. Microsoft recommends that customers running either of these products install the updates to be fully protected from the vulnerability.