CVE-2021-26423: .NET Core and Visual Studio Denial of Service Vulnerability

Overview

Severity
High (CVSS 7.5)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Category
Denial of Service
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2021-Aug
Released
2021-08-10
Last Updated
2021-08-19
EPSS Score
3.37% (percentile: 87.4%)

Affected Products (11)

Other

  • 11600
  • 11720
  • 11785
  • 11872
  • 11900
  • 11901
  • 11565
  • 11730
  • 11761
  • 11864
  • 11865

Security Updates (10)

Acknowledgments

<a href="https://twitter.com/ulldma">Peter Stöckli</a> with <a href="https://www.ergon.ch">Ergon Informatik</a>, <a href="https://twitter.com/ulldma">Peter Stöckli</a> with <a href="https://www.ergon.ch">Ergon Informatik</a>

Revision History

  • 2021-08-10: Information published.
  • 2021-08-10: In the Security Updates table, added links to the Release Notes. This is an informational change only.
  • 2021-08-12: Revised the Security Updates table to include PowerShell 7.0 and PowerShell 7.1 because these versions of PowerShell 7 incorporate the versions of .NET Core that are affected by this vulnerability. See https://github.com/PowerShell/Announcements/issues/25 for more information.
  • 2021-08-19: To comprehensively address this vulnerability, Microsoft has released .NET Core 2.1 Build Number 2.1.30. Customers who have downloaded Build 2.1.29 should download and install Build 2.1.30 to be fully protected from this vulnerability.