VYPR
High severityNVD Advisory· Published Jun 14, 2023· Updated Jan 1, 2025

.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

CVE-2023-24895

Description

.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

.NET WPF XPS document parsing vulnerability allows remote code execution via specially crafted XPS files.

Vulnerability

CVE-2023-24895 is a remote code execution vulnerability in .NET, .NET Framework, and Visual Studio, specifically in the Windows Presentation Foundation (WPF) framework's handling of XPS documents [1][2]. The root cause lies in how WPF applications load and render XPS documents, which can be exploited to execute arbitrary code on a target system [2][3].

Exploitation

No authentication is required to trigger the vulnerability; an attacker would need to convince a user to open a specially crafted XPS document [2]. This can be achieved via a malicious email attachment or a compromised website hosting the exploit file [1][2]. The attack surface is limited to Windows desktop applications built with WPF running .NET 6.0 (≤6.0.16) or .NET 7.0 (≤7.0.5) [2][3].

Impact

Successful exploitation grants the attacker the ability to execute arbitrary code in the context of the current user, potentially leading to full system compromise, data theft, installation of malware, or other malicious activities [1][2]. Microsoft notes no mitigating factors exist for this vulnerability, making it a high-severity issue for affected applications [2][3].

Mitigation

Microsoft has released patches for .NET 6.0 (6.0.18) and .NET 7.0 (7.0.7) via updated runtime packages [2][3]. Developers and users should update their .NET installations to the latest versions, which can be done through Visual Studio update prompts or by running 'dotnet --info' to check and manually apply updates [2][3]. WPF is a .NET Core UI framework for building Windows desktop applications, so any application using the affected 'Microsoft.WindowsDesktop.App.Runtime' packages is vulnerable and must be updated [2][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Microsoft.WindowsDesktop.App.Runtime.win-arm64NuGet
>= 7.0.0, < 7.0.77.0.7
Microsoft.WindowsDesktop.App.Runtime.win-x64NuGet
>= 7.0.0, < 7.0.77.0.7
Microsoft.WindowsDesktop.App.Runtime.win-x86NuGet
>= 7.0.0, < 7.0.77.0.7
Microsoft.WindowsDesktop.App.Runtime.win-arm64NuGet
>= 6.0.0, < 6.0.186.0.18
Microsoft.WindowsDesktop.App.Runtime.win-x64NuGet
>= 6.0.0, < 6.0.186.0.18
Microsoft.WindowsDesktop.App.Runtime.win-x86NuGet
>= 6.0.0, < 6.0.186.0.18

Affected products

24
  • osv-coords5 versions
    >= 6.0.0, < 6.0.1+ 4 more
    • (no CPE)range: >= 6.0.0, < 6.0.1
    • (no CPE)range: >= 6.0.0, < 6.0.1
    • (no CPE)range: >= 7.0.0, < 7.0.7
    • (no CPE)range: >= 7.0.0, < 7.0.7
    • (no CPE)range: >= 7.0.0, < 7.0.7
  • Microsoft/Microsoft .NET Framework 2.0 Service Pack 2v5
    Range: 2.0.0
  • Microsoft/Microsoft .NET Framework 3.0 Service Pack 2v5
    Range: 3.0.0
  • Microsoft/Microsoft .NET Framework 3.5v5
    Range: 3.5.0
  • Microsoft/Microsoft .NET Framework 3.5.1v5
    Range: 3.5.0
  • Microsoft/Microsoft .NET Framework 3.5 and 4.6.2v5
    Range: 4.7.0
  • Microsoft/Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2v5
    Range: 3.0.0.0
  • Microsoft/Microsoft .NET Framework 3.5 AND 4.7.2v5
    Range: 4.7.0
  • Microsoft/Microsoft .NET Framework 3.5 AND 4.8v5
    Range: 4.8.0
  • Microsoft/Microsoft .NET Framework 3.5 AND 4.8.1v5
    Range: 4.8.1
  • Microsoft/Microsoft .NET Framework 4.6.2v5
    Range: 4.7.0
  • Microsoft/Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2v5
    Range: 4.7.0
  • Microsoft/Microsoft .NET Framework 4.8v5
    Range: 4.8.0
  • Microsoft/Microsoft Visual Studio 2022 version 17.0v5
    Range: 17.0.0
  • Microsoft/Microsoft Visual Studio 2022 version 17.2v5
    Range: 17.2.0
  • Microsoft/Microsoft Visual Studio 2022 version 17.4v5
    Range: 17.4.0
  • Microsoft/Microsoft Visual Studio 2022 version 17.6v5
    Range: 17.6.0
  • Microsoft/.NET 7.0v5
    Range: 7.0.0
  • Microsoft/PowerShell 7.2v5
    Range: 7.2.0
  • Microsoft/PowerShell 7.3v5
    Range: 7.3.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.