.NET DLL Hijacking Remote Code Execution Vulnerability
Description
.NET DLL Hijacking Remote Code Execution Vulnerability
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
.NET DLL hijacking vulnerability allows remote code execution by loading a runtime DLL from an attacker-controlled location.
Vulnerability
Analysis
CVE-2023-28260 is a DLL hijacking vulnerability affecting .NET 6.0 and .NET 7.0 on Windows. The root cause lies in how the .NET runtime resolves and loads its DLLs—under certain conditions, the runtime can be tricked into loading a DLL from an unexpected, potentially attacker-controlled directory instead of the intended system path [1]. This occurs because the .NET runtime does not sufficiently restrict the search path or validate the origin of DLLs it loads, allowing a specially crafted DLL placed in an alternate location to be loaded into the process [1].
Exploitation
To exploit this vulnerability, an attacker would need to place a malicious DLL in a directory that the .NET runtime searches before the legitimate system path. On Windows, the DLL search order can be influenced by placing a file in the current working directory, the application directory, or any directory in the PATH environment variable that appears before the target directory. The attack does not require authentication, but the attacker must have some mechanism to deliver the malicious DLL to the victim's system—for example, by enticing the user to open a file from a network share or a web download that places the DLL in a location searched by the runtime [1]. The vulnerability is classified as remote code execution because the malicious DLL can be delivered remotely (e.g., via a website or email attachment), and when the .NET application loads the runtime DLL, the attacker's code executes within the context of the application [1].
Impact
Successful exploitation grants the attacker arbitrary code execution at the privilege level of the .NET application. Depending on the application's configuration, this could lead to full system compromise, data theft, or installation of malware. The CVSS score is not provided in the references, but the impact is rated as high by Microsoft, consistent with remote code execution vulnerabilities [1][2].
Mitigation
Microsoft has released updates for .NET 6.0 and .NET 7.0 to address this vulnerability. Users should update to .NET 6.0.16 (or later) and .NET 7.0.5 (or later) to obtain the fix [1]. Developers are advised to ensure their applications are rebuilt and redeployed with the patched runtime. No mitigations have been identified by Microsoft; installation of the latest .NET version is the recommended course of action [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.NetCore.App.Runtime.win-armNuGet | >= 7.0.0, < 7.0.5 | 7.0.5 |
Microsoft.NetCore.App.Runtime.win-armNuGet | >= 6.0.0, < 6.0.16 | 6.0.16 |
Microsoft.NetCore.App.Runtime.win-arm64NuGet | >= 7.0.0, < 7.0.5 | 7.0.5 |
Microsoft.NetCore.App.Runtime.win-arm64NuGet | >= 6.0.0, < 6.0.16 | 6.0.16 |
Microsoft.NetCore.App.Runtime.win-x86NuGet | >= 7.0.0, < 7.0.5 | 7.0.5 |
Microsoft.NetCore.App.Runtime.win-x86NuGet | >= 6.0.0, < 6.0.16 | 6.0.16 |
Microsoft.NetCore.App.Runtime.win-x64NuGet | >= 6.0.0, < 6.0.16 | 6.0.16 |
Microsoft.NetCore.App.Runtime.win-x64NuGet | >= 7.0.0, < 7.0.5 | 7.0.5 |
Affected products
32- osv-coords24 versionspkg:apk/chainguard/aspnet-7-runtimepkg:apk/chainguard/aspnet-7-runtime-defaultpkg:apk/chainguard/aspnet-7-targeting-packpkg:apk/chainguard/dotnet-7pkg:apk/chainguard/dotnet-7-runtimepkg:apk/chainguard/dotnet-7-runtime-defaultpkg:apk/chainguard/dotnet-7-sdkpkg:apk/chainguard/dotnet-7-sdk-defaultpkg:apk/chainguard/dotnet-7-targeting-packpkg:apk/wolfi/aspnet-7-runtimepkg:apk/wolfi/aspnet-7-runtime-defaultpkg:apk/wolfi/aspnet-7-targeting-packpkg:apk/wolfi/dotnet-7pkg:apk/wolfi/dotnet-7-runtimepkg:apk/wolfi/dotnet-7-runtime-defaultpkg:apk/wolfi/dotnet-7-sdkpkg:apk/wolfi/dotnet-7-sdk-defaultpkg:apk/wolfi/dotnet-7-targeting-packpkg:bitnami/dotnetpkg:bitnami/dotnet-sdkpkg:nuget/microsoft.netcore.app.runtime.win-armpkg:nuget/microsoft.netcore.app.runtime.win-arm64pkg:nuget/microsoft.netcore.app.runtime.win-x64pkg:nuget/microsoft.netcore.app.runtime.win-x86
< 7.0.105-r0+ 23 more
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: < 7.0.105-r0
- (no CPE)range: >= 6.0.0, < 6.0.16
- (no CPE)range: >= 6.0.0, < 6.0.16
- (no CPE)range: >= 7.0.0, < 7.0.5
- (no CPE)range: >= 7.0.0, < 7.0.5
- (no CPE)range: >= 6.0.0, < 6.0.16
- (no CPE)range: >= 7.0.0, < 7.0.5
- Microsoft/Microsoft Visual Studio 2022 version 17.0v5Range: 17.0.0
- Microsoft/Microsoft Visual Studio 2022 version 17.2v5Range: 17.2.0
- Microsoft/Microsoft Visual Studio 2022 version 17.4v5Range: 17.4.0
- Microsoft/Microsoft Visual Studio 2022 version 17.5v5Range: 17.5.0
- Microsoft/.NET 6.0v5Range: 6.0.0
- Microsoft/.NET 7.0v5Range: 7.0.0
- Microsoft/PowerShell 7.2v5Range: 7.2.0
- Microsoft/PowerShell 7.3v5Range: 7.3.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-w4m3-43gp-x8hxghsaADVISORY
- msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28260ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2023-28260ghsaADVISORY
- github.com/dotnet/runtime/security/advisories/GHSA-w4m3-43gp-x8hxghsaWEB
- www.cve.org/CVERecordghsaWEB
News mentions
0No linked articles in our index yet.