.NET Denial of Service Vulnerability
Description
.NET Denial of Service Vulnerability
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A Denial of Service vulnerability in .NET 6.0 and 5.0 allows unauthenticated remote attackers to crash Kestrel web servers via crafted HTTP/2 or HTTP/3 requests.
Vulnerability
A Denial of Service (DoS) vulnerability exists in .NET 6.0 (versions 6.0.1 and earlier) and .NET 5.0 (versions 5.0.13 and earlier) when the Kestrel web server processes certain HTTP/2 and HTTP/3 requests [1][4]. The flaw lies in how Kestrel handles specific malformed or specially crafted HTTP/2 and HTTP/3 frames, leading to resource exhaustion [1]. No special configuration is required for the code path to be reachable—any .NET application using Kestrel as the web server and accepting HTTP/2 or HTTP/3 connections is affected [1].
Exploitation
An attacker can exploit this vulnerability by sending a series of carefully crafted HTTP/2 or HTTP/3 requests to a vulnerable Kestrel endpoint from any network position that can reach the server [1]. The attacker does not need authentication or prior access to the server [1]. The specific sequence involves transmitting malformed HTTP/2 or HTTP/3 frames that trigger an out-of-memory condition or infinite loop within Kestrel's request processing pipeline [1]. No user interaction is required [1].
Impact
Successful exploitation results in a Denial of Service condition: the Kestrel web server becomes unresponsive, causing legitimate requests to fail or be delayed [1]. The attack does not lead to information disclosure, data tampering, or code execution [1]. The scope is limited to the affected .NET application—the underlying operating system and other services remain unaffected [1].
Mitigation
Microsoft released fixes on February 8, 2022. Users should update to .NET 6.0.2 (SDK 6.0.102) or .NET 5.0.14 (SDK 5.0.114 or 5.0.405) [1][4]. The updates are available via the .NET download page, Microsoft Update, or Visual Studio prompts [1][4]. No mitigating factors or workarounds have been identified [1]. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities (KEV) catalog as of the publication date [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.AspNetCore.App.Runtime.win-x64NuGet | >= 5.0.0, < 5.0.14 | 5.0.14 |
Microsoft.AspNetCore.App.Runtime.linux-x64NuGet | >= 5.0.0, < 5.0.14 | 5.0.14 |
Microsoft.AspNetCore.App.Runtime.win-x86NuGet | >= 5.0.0, < 5.0.14 | 5.0.14 |
Microsoft.AspNetCore.App.Runtime.osx-x64NuGet | >= 5.0.0, < 5.0.14 | 5.0.14 |
Microsoft.AspNetCore.App.Runtime.linux-musl-x64NuGet | >= 5.0.0, < 5.0.14 | 5.0.14 |
Microsoft.AspNetCore.App.Runtime.linux-arm64NuGet | >= 5.0.0, < 5.0.14 | 5.0.14 |
Microsoft.AspNetCore.App.Runtime.linux-armNuGet | >= 5.0.0, < 5.0.14 | 5.0.14 |
Microsoft.AspNetCore.App.Runtime.win-arm64NuGet | >= 5.0.0, < 5.0.14 | 5.0.14 |
Microsoft.AspNetCore.App.Runtime.win-armNuGet | >= 5.0.0, < 5.0.14 | 5.0.14 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64NuGet | >= 5.0.0, < 5.0.14 | 5.0.14 |
Microsoft.AspNetCore.App.Runtime.linux-musl-armNuGet | >= 5.0.0, < 5.0.14 | 5.0.14 |
Microsoft.AspNetCore.App.Runtime.linux-armNuGet | >= 6.0.0, < 6.0.2 | 6.0.2 |
Microsoft.AspNetCore.App.Runtime.linux-arm64NuGet | >= 6.0.0, < 6.0.2 | 6.0.2 |
Microsoft.AspNetCore.App.Runtime.linux-musl-armNuGet | >= 6.0.0, < 6.0.2 | 6.0.2 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64NuGet | >= 6.0.0, < 6.0.2 | 6.0.2 |
Microsoft.AspNetCore.App.Runtime.linux-musl-x64NuGet | >= 6.0.0, < 6.0.2 | 6.0.2 |
Microsoft.AspNetCore.App.Runtime.linux-x64NuGet | >= 6.0.0, < 6.0.2 | 6.0.2 |
Microsoft.AspNetCore.App.Runtime.osx-arm64NuGet | >= 6.0.0, < 6.0.2 | 6.0.2 |
Microsoft.AspNetCore.App.Runtime.osx-x64NuGet | >= 6.0.0, < 6.0.2 | 6.0.2 |
Microsoft.AspNetCore.App.Runtime.win-armNuGet | >= 6.0.0, < 6.0.2 | 6.0.2 |
Microsoft.AspNetCore.App.Runtime.win-arm64NuGet | >= 6.0.0, < 6.0.2 | 6.0.2 |
Microsoft.AspNetCore.App.Runtime.win-x64NuGet | >= 6.0.0, < 6.0.2 | 6.0.2 |
Microsoft.AspNetCore.App.Runtime.win-x86NuGet | >= 6.0.0, < 6.0.2 | 6.0.2 |
Affected products
20- osv-coords14 versionspkg:bitnami/dotnetpkg:bitnami/dotnet-sdkpkg:nuget/microsoft.aspnetcore.app.runtime.linux-armpkg:nuget/microsoft.aspnetcore.app.runtime.linux-arm64pkg:nuget/microsoft.aspnetcore.app.runtime.linux-musl-armpkg:nuget/microsoft.aspnetcore.app.runtime.linux-musl-arm64pkg:nuget/microsoft.aspnetcore.app.runtime.linux-musl-x64pkg:nuget/microsoft.aspnetcore.app.runtime.linux-x64pkg:nuget/microsoft.aspnetcore.app.runtime.osx-arm64pkg:nuget/microsoft.aspnetcore.app.runtime.osx-x64pkg:nuget/microsoft.aspnetcore.app.runtime.win-armpkg:nuget/microsoft.aspnetcore.app.runtime.win-arm64pkg:nuget/microsoft.aspnetcore.app.runtime.win-x64pkg:nuget/microsoft.aspnetcore.app.runtime.win-x86
>= 5.0.0, < 5.0.14+ 13 more
- (no CPE)range: >= 5.0.0, < 5.0.14
- (no CPE)range: >= 5.0.0, < 5.0.14
- (no CPE)range: >= 5.0.0, < 5.0.14
- (no CPE)range: >= 5.0.0, < 5.0.14
- (no CPE)range: >= 5.0.0, < 5.0.14
- (no CPE)range: >= 5.0.0, < 5.0.14
- (no CPE)range: >= 5.0.0, < 5.0.14
- (no CPE)range: >= 5.0.0, < 5.0.14
- (no CPE)range: >= 6.0.0, < 6.0.2
- (no CPE)range: >= 5.0.0, < 5.0.14
- (no CPE)range: >= 5.0.0, < 5.0.14
- (no CPE)range: >= 5.0.0, < 5.0.14
- (no CPE)range: >= 5.0.0, < 5.0.14
- (no CPE)range: >= 5.0.0, < 5.0.14
- Microsoft/Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)v5Range: 16.11.0
- Microsoft/Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)v5Range: 15.0.0
- Microsoft/Microsoft Visual Studio 2022 version 17.0v5Range: 17.0.0
- Microsoft/.NET 5.0v5Range: 5.0.0
- Microsoft/.NET 6.0v5Range: 6.0.0
- Microsoft/Visual Studio 2019 for Mac version 8.10v5Range: 8.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- github.com/advisories/GHSA-x459-p2rx-f8ffghsaADVISORY
- msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21986ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2022-21986ghsaADVISORY
- github.com/dotnet/announcements/issues/207ghsaWEB
- github.com/dotnet/aspnetcore/security/advisories/GHSA-x459-p2rx-f8ffghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HMQOHV7G5TF6OMBN6DNTDOKQQU7KHMMghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCTBSBE3PNIMXG6ALX2CQG4ZEH7W3YATghsaWEB
- portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21986ghsaWEB
News mentions
0No linked articles in our index yet.