.NET and Visual Studio Remote Code Execution Vulnerability
Description
.NET and Visual Studio Remote Code Execution Vulnerability
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
.NET and Visual Studio RCE vulnerability due to arbitrary binary loading during crash/stack trace scenarios affects .NET 6.0 and 7.0.
Vulnerability
Overview
CVE-2023-33126 is a remote code execution vulnerability in .NET and Visual Studio. The root cause is a flaw in how .NET handles crash and stack trace scenarios, which could allow an attacker to load arbitrary binaries. This vulnerability affects both .NET 6.0 and .NET 7.0, and no mitigating factors have been identified by Microsoft. [1][2]
Exploitation
Details
To exploit this vulnerability, an attacker would need to trigger a crash or stack trace in a .NET application running an affected version. The attack surface involves any .NET application that could be made to crash, potentially through crafted input or other means. No authentication is required for exploitation, as the binary loading can occur during the crash handling process. The vulnerability is triggered when the runtime attempts to load binaries from an unexpected location during error handling. [1][2]
Impact
Successful exploitation allows an attacker to execute arbitrary code in the context of the .NET application, leading to full remote code execution. This could result in data theft, system compromise, or lateral movement within a network. The severity of this vulnerability is reflected in its classification as a remote code execution issue. [1][4]
Mitigation
Microsoft has released patches for both .NET 6.0 and .NET 7.0. Users should update to the latest versions: .NET 7.0.107 or later, or .NET 6.0.118 or later, and the corresponding runtime packages. Visual Studio will prompt users to update their .NET SDKs. No workarounds are available. [1][2]
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.NetCore.App.Runtime.win-armNuGet | >= 7.0.0, < 7.0.7 | 7.0.7 |
Microsoft.NetCore.App.Runtime.win-armNuGet | >= 6.0.0, < 6.0.18 | 6.0.18 |
Microsoft.NetCore.App.Runtime.win-arm64NuGet | >= 7.0.0, < 7.0.7 | 7.0.7 |
Microsoft.NetCore.App.Runtime.win-arm64NuGet | >= 6.0.0, < 6.0.18 | 6.0.18 |
Microsoft.NetCore.App.Runtime.win-x64NuGet | >= 7.0.0, < 7.0.7 | 7.0.7 |
Microsoft.NetCore.App.Runtime.win-x64NuGet | >= 6.0.0, < 6.0.18 | 6.0.18 |
Microsoft.NetCore.App.Runtime.win-x86NuGet | >= 6.0.0, < 6.0.18 | 6.0.18 |
Microsoft.NetCore.App.Runtime.win-x86NuGet | >= 7.0.0, < 7.0.7 | 7.0.7 |
Affected products
13- osv-coords6 versionspkg:bitnami/dotnetpkg:bitnami/dotnet-sdkpkg:nuget/microsoft.netcore.app.runtime.win-armpkg:nuget/microsoft.netcore.app.runtime.win-arm64pkg:nuget/microsoft.netcore.app.runtime.win-x64pkg:nuget/microsoft.netcore.app.runtime.win-x86
>= 6.0.0, < 6.0.18+ 5 more
- (no CPE)range: >= 6.0.0, < 6.0.18
- (no CPE)range: >= 6.0.0, < 6.0.18
- (no CPE)range: >= 7.0.0, < 7.0.7
- (no CPE)range: >= 7.0.0, < 7.0.7
- (no CPE)range: >= 7.0.0, < 7.0.7
- (no CPE)range: >= 6.0.0, < 6.0.18
- Microsoft/Microsoft Visual Studio 2022 version 17.0v5Range: 17.0.0
- Microsoft/Microsoft Visual Studio 2022 version 17.2v5Range: 17.2.0
- Microsoft/Microsoft Visual Studio 2022 version 17.4v5Range: 17.4.0
- Microsoft/Microsoft Visual Studio 2022 version 17.6v5Range: 17.6.0
- Microsoft/.NET 6.0v5Range: 6.0.0
- Microsoft/.NET 7.0v5Range: 7.0.0
- Microsoft/PowerShell 7.2v5Range: 7.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-gh24-9qjj-mr67ghsaADVISORY
- msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2023-33126ghsaADVISORY
- github.com/dotnet/announcements/issues/254ghsaWEB
- github.com/dotnet/sdk/security/advisories/GHSA-gh24-9qjj-mr67ghsaWEB
News mentions
0No linked articles in our index yet.