VYPR
High severityNVD Advisory· Published Jul 11, 2023· Updated Jan 1, 2025

ASP.NET and Visual Studio Security Feature Bypass Vulnerability

CVE-2023-33170

Description

ASP.NET and Visual Studio Security Feature Bypass Vulnerability

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ASP.NET Core's account lockout mechanism does not immediately update the failed attempts count, allowing attackers to bypass the lockout threshold.

Vulnerability

Overview

CVE-2023-33170 is a security feature bypass vulnerability in ASP.NET Core affecting the account lockout functionality. The root cause is that the maximum failed attempts count may not be immediately updated in certain scenarios, allowing an attacker to attempt more passwords than intended before the lockout is enforced. This issue impacts ASP.NET Core 2.1 and above, including .NET 6.0, .NET 7.0, and the Microsoft.AspNetCore.Identity NuGet package [2][3].

Exploitation

Conditions

Exploitation does not require any special privileges but does depend on the application using ASP.NET Core's Identity framework for authentication. An attacker can repeatedly submit login requests without the lockout mechanism correctly tracking the failed attempts. No authentication is needed to launch this attack, only network access to the affected application [2][3].

Impact

A successful exploit allows an attacker to conduct brute-force password guessing attacks beyond the configured account lockout threshold. This increases the likelihood of compromising a user account, especially for weak or common passwords. The vulnerability bypasses a critical security control intended to prevent automated password guessing [2][3].

Mitigation

Microsoft has released patches for all affected platforms. Users should update their applications to the latest versions: .NET 7.0.9 or later, .NET 6.0.20 or later, and Microsoft.AspNetCore.Identity package version 2.1.39 or later. There are no known workarounds for this vulnerability, and it is not currently listed in CISA's Known Exploited Vulnerabilities catalog [2][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Microsoft.AspNetCore.IdentityNuGet
< 2.1.392.1.39
Microsoft.AspNet.Identity.OwinNuGet
< 2.2.42.2.4
Microsoft.AspNetCore.App.Runtime.linux-armNuGet
< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.linux-arm64NuGet
< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.linux-musl-armNuGet
< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64NuGet
< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.linux-x64NuGet
< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.osx-x64NuGet
< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.win-armNuGet
< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.win-arm64NuGet
< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.win-x64NuGet
< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.win-x86NuGet
< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.win-x86NuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.win-x64NuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.win-arm64NuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.win-armNuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.osx-x64NuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.osx-arm64NuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-x64NuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-musl-x64NuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64NuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-musl-armNuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-armNuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-arm64NuGet
>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-musl-x64NuGet
< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.osx-arm64NuGet
< 6.0.206.0.20

Affected products

43

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.