VYPR
High severityNVD Advisory· Published Apr 11, 2023· Updated Jan 23, 2025

.NET DLL Hijacking Remote Code Execution Vulnerability

CVE-2023-28260

Description

.NET DLL Hijacking Remote Code Execution Vulnerability

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

.NET DLL hijacking vulnerability allows remote code execution by loading a runtime DLL from an attacker-controlled location.

Vulnerability

Analysis

CVE-2023-28260 is a DLL hijacking vulnerability affecting .NET 6.0 and .NET 7.0 on Windows. The root cause lies in how the .NET runtime resolves and loads its DLLs—under certain conditions, the runtime can be tricked into loading a DLL from an unexpected, potentially attacker-controlled directory instead of the intended system path [1]. This occurs because the .NET runtime does not sufficiently restrict the search path or validate the origin of DLLs it loads, allowing a specially crafted DLL placed in an alternate location to be loaded into the process [1].

Exploitation

To exploit this vulnerability, an attacker would need to place a malicious DLL in a directory that the .NET runtime searches before the legitimate system path. On Windows, the DLL search order can be influenced by placing a file in the current working directory, the application directory, or any directory in the PATH environment variable that appears before the target directory. The attack does not require authentication, but the attacker must have some mechanism to deliver the malicious DLL to the victim's system—for example, by enticing the user to open a file from a network share or a web download that places the DLL in a location searched by the runtime [1]. The vulnerability is classified as remote code execution because the malicious DLL can be delivered remotely (e.g., via a website or email attachment), and when the .NET application loads the runtime DLL, the attacker's code executes within the context of the application [1].

Impact

Successful exploitation grants the attacker arbitrary code execution at the privilege level of the .NET application. Depending on the application's configuration, this could lead to full system compromise, data theft, or installation of malware. The CVSS score is not provided in the references, but the impact is rated as high by Microsoft, consistent with remote code execution vulnerabilities [1][2].

Mitigation

Microsoft has released updates for .NET 6.0 and .NET 7.0 to address this vulnerability. Users should update to .NET 6.0.16 (or later) and .NET 7.0.5 (or later) to obtain the fix [1]. Developers are advised to ensure their applications are rebuilt and redeployed with the patched runtime. No mitigations have been identified by Microsoft; installation of the latest .NET version is the recommended course of action [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Microsoft.NetCore.App.Runtime.win-armNuGet
>= 7.0.0, < 7.0.57.0.5
Microsoft.NetCore.App.Runtime.win-armNuGet
>= 6.0.0, < 6.0.166.0.16
Microsoft.NetCore.App.Runtime.win-arm64NuGet
>= 7.0.0, < 7.0.57.0.5
Microsoft.NetCore.App.Runtime.win-arm64NuGet
>= 6.0.0, < 6.0.166.0.16
Microsoft.NetCore.App.Runtime.win-x86NuGet
>= 7.0.0, < 7.0.57.0.5
Microsoft.NetCore.App.Runtime.win-x86NuGet
>= 6.0.0, < 6.0.166.0.16
Microsoft.NetCore.App.Runtime.win-x64NuGet
>= 6.0.0, < 6.0.166.0.16
Microsoft.NetCore.App.Runtime.win-x64NuGet
>= 7.0.0, < 7.0.57.0.5

Affected products

32

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.