CVE-2025-55247: .NET Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 7.3)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2025-Oct
Released
2025-10-14
EPSS Score
0.01% (percentile: 3.0%)

Description

Improper link resolution before file access ('link following') in .NET allows an authorized attacker to elevate privileges locally.

FAQ

What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain the privileges of the authenticated user. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authenticated attacker could place a malicious file in the core project path and then wait for a user with admin privileges to create or build a .NET project to gain elevated privileges.

Affected Products (2)

Developer Tools

  • .NET 8.0 installed on Linux
  • .NET 9.0 installed on Linux

Security Updates (2)

Revision History

  • 2025-10-14: Information published.