.NET Core and Visual Studio Denial of Service Vulnerability
Description
.NET Core and Visual Studio Denial of Service Vulnerability
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A vulnerability in .NET Kestrel allows a malicious client to bypass QUIC stream limits in HTTP/3, causing a denial of service (DoS) in affected .NET 7.0 applications.
Vulnerability
Overview
The vulnerability (CVE-2023-38178) resides in the Kestrel web server used by .NET Core and ASP.NET Core. Specifically, it affects the HTTP/3 implementation, where a flaw allows a malicious client to bypass the configured QUIC stream limit. This can lead to resource exhaustion and ultimately a denial of service (DoS) condition on the server [1].
Exploitation
Prerequisites
An attacker only needs network access to the server to exploit this vulnerability; no authentication is required. By sending specially crafted HTTP/3 requests, the attacker can exceed the intended stream count, consuming server resources and degrading or denying service to legitimate users [1].
Impact
Successful exploitation results in a denial of service, making the application unavailable. The vulnerability affects all .NET 7.0 applications running versions 7.0.9 or earlier, and also impacts .NET 6 applications that have opted into HTTP/3 preview features [1].
Mitigation
Microsoft has released a patch in .NET 7.0.10 to address the issue. Users are strongly advised to update their runtime and SDK packages to the latest version. For .NET 6 applications using HTTP/3, upgrading to .NET 7 is required to receive the fix [1][2]. No workarounds are available.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.AspNetCore.App.Runtime.win-arm64NuGet | >= 7.0.0, < 7.0.10 | 7.0.10 |
Microsoft.AspNetCore.App.Runtime.win-armNuGet | >= 7.0.0, < 7.0.10 | 7.0.10 |
Microsoft.AspNetCore.App.Runtime.win-x64NuGet | >= 7.0.0, < 7.0.10 | 7.0.10 |
Microsoft.AspNetCore.App.Runtime.win-x86NuGet | >= 7.0.0, < 7.0.10 | 7.0.10 |
Microsoft.NetCore.App.Runtime.win-armNuGet | >= 7.0.0, < 7.0.10 | 7.0.10 |
Microsoft.NetCore.App.Runtime.win-arm64NuGet | >= 7.0.0, < 7.0.10 | 7.0.10 |
Microsoft.NetCore.App.Runtime.win-x64NuGet | >= 7.0.0, < 7.0.10 | 7.0.10 |
Microsoft.NetCore.App.Runtime.win-x86NuGet | >= 7.0.0, < 7.0.10 | 7.0.10 |
Affected products
13- osv-coords10 versionspkg:bitnami/dotnetpkg:bitnami/dotnet-sdkpkg:nuget/microsoft.aspnetcore.app.runtime.win-armpkg:nuget/microsoft.aspnetcore.app.runtime.win-arm64pkg:nuget/microsoft.aspnetcore.app.runtime.win-x64pkg:nuget/microsoft.aspnetcore.app.runtime.win-x86pkg:nuget/microsoft.netcore.app.runtime.win-armpkg:nuget/microsoft.netcore.app.runtime.win-arm64pkg:nuget/microsoft.netcore.app.runtime.win-x64pkg:nuget/microsoft.netcore.app.runtime.win-x86
>= 6.0.0, < 6.0.1+ 9 more
- (no CPE)range: >= 6.0.0, < 6.0.1
- (no CPE)range: >= 6.0.0, < 6.0.1
- (no CPE)range: >= 7.0.0, < 7.0.10
- (no CPE)range: >= 7.0.0, < 7.0.10
- (no CPE)range: >= 7.0.0, < 7.0.10
- (no CPE)range: >= 7.0.0, < 7.0.10
- (no CPE)range: >= 7.0.0, < 7.0.10
- (no CPE)range: >= 7.0.0, < 7.0.10
- (no CPE)range: >= 7.0.0, < 7.0.10
- (no CPE)range: >= 7.0.0, < 7.0.10
- Microsoft/Microsoft Visual Studio 2022 version 17.2v5Range: 17.2.0
- Microsoft/Microsoft Visual Studio 2022 version 17.4v5Range: 17.4.0
- Microsoft/.NET 6.0v5Range: 6.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-p57v-gv7q-4xfmghsaADVISORY
- msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2023-38178ghsaADVISORY
- github.com/dotnet/runtime/security/advisories/GHSA-p57v-gv7q-4xfmghsaWEB
News mentions
0No linked articles in our index yet.