VYPR
High severityNVD Advisory· Published Jun 13, 2023· Updated Jan 1, 2025

.NET and Visual Studio Remote Code Execution Vulnerability

CVE-2023-33126

Description

.NET and Visual Studio Remote Code Execution Vulnerability

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

.NET and Visual Studio RCE vulnerability due to arbitrary binary loading during crash/stack trace scenarios affects .NET 6.0 and 7.0.

Vulnerability

Overview

CVE-2023-33126 is a remote code execution vulnerability in .NET and Visual Studio. The root cause is a flaw in how .NET handles crash and stack trace scenarios, which could allow an attacker to load arbitrary binaries. This vulnerability affects both .NET 6.0 and .NET 7.0, and no mitigating factors have been identified by Microsoft. [1][2]

Exploitation

Details

To exploit this vulnerability, an attacker would need to trigger a crash or stack trace in a .NET application running an affected version. The attack surface involves any .NET application that could be made to crash, potentially through crafted input or other means. No authentication is required for exploitation, as the binary loading can occur during the crash handling process. The vulnerability is triggered when the runtime attempts to load binaries from an unexpected location during error handling. [1][2]

Impact

Successful exploitation allows an attacker to execute arbitrary code in the context of the .NET application, leading to full remote code execution. This could result in data theft, system compromise, or lateral movement within a network. The severity of this vulnerability is reflected in its classification as a remote code execution issue. [1][4]

Mitigation

Microsoft has released patches for both .NET 6.0 and .NET 7.0. Users should update to the latest versions: .NET 7.0.107 or later, or .NET 6.0.118 or later, and the corresponding runtime packages. Visual Studio will prompt users to update their .NET SDKs. No workarounds are available. [1][2]

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Microsoft.NetCore.App.Runtime.win-armNuGet
>= 7.0.0, < 7.0.77.0.7
Microsoft.NetCore.App.Runtime.win-armNuGet
>= 6.0.0, < 6.0.186.0.18
Microsoft.NetCore.App.Runtime.win-arm64NuGet
>= 7.0.0, < 7.0.77.0.7
Microsoft.NetCore.App.Runtime.win-arm64NuGet
>= 6.0.0, < 6.0.186.0.18
Microsoft.NetCore.App.Runtime.win-x64NuGet
>= 7.0.0, < 7.0.77.0.7
Microsoft.NetCore.App.Runtime.win-x64NuGet
>= 6.0.0, < 6.0.186.0.18
Microsoft.NetCore.App.Runtime.win-x86NuGet
>= 6.0.0, < 6.0.186.0.18
Microsoft.NetCore.App.Runtime.win-x86NuGet
>= 7.0.0, < 7.0.77.0.7

Affected products

13

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.