Visual Studio Denial of Service Vulnerability
Description
Visual Studio Denial of Service Vulnerability
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A deadlock in ASP.NET Core Kestrel web server can be triggered over HTTP/2, causing a denial of service on .NET 7/8 applications.
Vulnerability
Overview
CVE-2024-30046 is a denial-of-service (DoS) vulnerability in the ASP.NET Core Kestrel web server, affecting applications built with .NET 7.0 and .NET 8.0. The flaw exists in the Microsoft.AspNetCore.Server.Kestrel.Core.dll component, where a specific concurrency condition can lead to a deadlock [1][2]. This means that under certain network conditions, the server’s request-processing pipeline becomes permanently blocked, preventing it from handling new or existing connections.
Exploitation
Conditions
An unauthenticated remote attacker can exploit this vulnerability without any special privileges or user interaction. The attack vector is over the network, leveraging HTTP/2 multiplexed streams to trigger the deadlock in the Kestrel core [1][3]. Because Kestrel is the default web server for ASP.NET Core, a wide range of web applications, APIs, and services are potentially exposed. The vulnerability affects any .NET 7.0 application running version 7.0.18 or earlier, and any .NET 8.0 application on version 8.0.4 or earlier [1][2].
Impact
Successful exploitation results in a prolonged denial of service. The deadlock causes the Kestrel server to stop responding to client requests, effectively taking the affected application offline. This can disrupt service availability for users and dependent systems. Microsoft has stated that no mitigating factors or workarounds exist beyond applying the security update [1][3].
Mitigation
Status
Microsoft has released patches for both .NET 7.0 (update 7.0.19) and .NET 8.0 (update 8.0.5) through the affected NuGet packages, such as Microsoft.AspNetCore.App.Runtime.* [1][2][3]. Developers should update their projects to the patched versions immediately. There is no indication that this vulnerability has been added to the Known Exploited Vulnerabilities (KEV) catalog at the time of publication, but given the ease of remote exploitation, prompt patching is strongly recommended.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.AspNetCore.App.Runtime.linux-armNuGet | >= 7.0.0, < 7.0.19 | 7.0.19 |
Microsoft.AspNetCore.App.Runtime.linux-armNuGet | >= 8.0.0, < 8.0.5 | 8.0.5 |
Microsoft.AspNetCore.App.Runtime.linux-arm64NuGet | >= 7.0.0, < 7.0.19 | 7.0.19 |
Microsoft.AspNetCore.App.Runtime.linux-musl-armNuGet | >= 8.0.0, < 8.0.5 | 8.0.5 |
Microsoft.AspNetCore.App.Runtime.linux-musl-armNuGet | >= 7.0.0, < 7.0.19 | 7.0.19 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64NuGet | >= 7.0.0, < 7.0.19 | 7.0.19 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64NuGet | >= 8.0.0, < 8.0.5 | 8.0.5 |
Microsoft.AspNetCore.App.Runtime.linux-musl-x64NuGet | >= 7.0.0, < 7.0.19 | 7.0.19 |
Microsoft.AspNetCore.App.Runtime.linux-musl-x64NuGet | >= 8.0.0, < 8.0.5 | 8.0.5 |
Microsoft.AspNetCore.App.Runtime.linux-x64NuGet | >= 7.0.0, < 7.0.19 | 7.0.19 |
Microsoft.AspNetCore.App.Runtime.linux-x64NuGet | >= 8.0.0, < 8.0.5 | 8.0.5 |
Microsoft.AspNetCore.App.Runtime.osx-arm64NuGet | >= 7.0.0, < 7.0.19 | 7.0.19 |
Microsoft.AspNetCore.App.Runtime.osx-arm64NuGet | >= 8.0.0, < 8.0.5 | 8.0.5 |
Microsoft.AspNetCore.App.Runtime.osx-x64NuGet | >= 7.0.0, < 7.0.19 | 7.0.19 |
Microsoft.AspNetCore.App.Runtime.osx-x64NuGet | >= 8.0.0, < 8.0.5 | 8.0.5 |
Microsoft.AspNetCore.App.Runtime.win-armNuGet | >= 7.0.0, < 7.0.19 | 7.0.19 |
Microsoft.AspNetCore.App.Runtime.win-armNuGet | >= 8.0.0, < 8.0.5 | 8.0.5 |
Microsoft.AspNetCore.App.Runtime.win-arm64NuGet | >= 7.0.0, < 7.0.19 | 7.0.19 |
Microsoft.AspNetCore.App.Runtime.win-arm64NuGet | >= 8.0.0, < 8.0.5 | 8.0.5 |
Microsoft.AspNetCore.App.Runtime.win-x64NuGet | >= 7.0.0, < 7.0.19 | 7.0.19 |
Microsoft.AspNetCore.App.Runtime.win-x64NuGet | >= 8.0.0, < 8.0.5 | 8.0.5 |
Microsoft.AspNetCore.App.Runtime.win-x86NuGet | >= 7.0.0, < 7.0.19 | 7.0.19 |
Microsoft.AspNetCore.App.Runtime.win-x86NuGet | >= 8.0.0, < 8.0.5 | 8.0.5 |
Microsoft.AspNetCore.App.Runtime.linux-arm64NuGet | >= 8.0.0, < 8.0.5 | 8.0.5 |
Affected products
44- osv-coords38 versionspkg:bitnami/dotnetpkg:bitnami/dotnet-sdkpkg:nuget/microsoft.aspnetcore.app.runtime.linux-armpkg:nuget/microsoft.aspnetcore.app.runtime.linux-arm64pkg:nuget/microsoft.aspnetcore.app.runtime.linux-musl-armpkg:nuget/microsoft.aspnetcore.app.runtime.linux-musl-arm64pkg:nuget/microsoft.aspnetcore.app.runtime.linux-musl-x64pkg:nuget/microsoft.aspnetcore.app.runtime.linux-x64pkg:nuget/microsoft.aspnetcore.app.runtime.osx-arm64pkg:nuget/microsoft.aspnetcore.app.runtime.osx-x64pkg:nuget/microsoft.aspnetcore.app.runtime.win-armpkg:nuget/microsoft.aspnetcore.app.runtime.win-arm64pkg:nuget/microsoft.aspnetcore.app.runtime.win-x64pkg:nuget/microsoft.aspnetcore.app.runtime.win-x86pkg:rpm/almalinux/aspnetcore-runtime-7.0pkg:rpm/almalinux/aspnetcore-runtime-8.0pkg:rpm/almalinux/aspnetcore-runtime-dbg-8.0pkg:rpm/almalinux/aspnetcore-targeting-pack-7.0pkg:rpm/almalinux/aspnetcore-targeting-pack-8.0pkg:rpm/almalinux/dotnetpkg:rpm/almalinux/dotnet-apphost-pack-7.0pkg:rpm/almalinux/dotnet-apphost-pack-8.0pkg:rpm/almalinux/dotnet-hostpkg:rpm/almalinux/dotnet-hostfxr-7.0pkg:rpm/almalinux/dotnet-hostfxr-8.0pkg:rpm/almalinux/dotnet-runtime-7.0pkg:rpm/almalinux/dotnet-runtime-8.0pkg:rpm/almalinux/dotnet-runtime-dbg-8.0pkg:rpm/almalinux/dotnet-sdk-7.0pkg:rpm/almalinux/dotnet-sdk-7.0-source-built-artifactspkg:rpm/almalinux/dotnet-sdk-8.0pkg:rpm/almalinux/dotnet-sdk-8.0-source-built-artifactspkg:rpm/almalinux/dotnet-sdk-dbg-8.0pkg:rpm/almalinux/dotnet-targeting-pack-7.0pkg:rpm/almalinux/dotnet-targeting-pack-8.0pkg:rpm/almalinux/dotnet-templates-7.0pkg:rpm/almalinux/dotnet-templates-8.0pkg:rpm/almalinux/netstandard-targeting-pack-2.1
>= 7.0.0, < 7.0.19+ 37 more
- (no CPE)range: >= 7.0.0, < 7.0.19
- (no CPE)range: >= 7.0.0, < 7.0.19
- (no CPE)range: >= 7.0.0, < 7.0.19
- (no CPE)range: >= 7.0.0, < 7.0.19
- (no CPE)range: >= 8.0.0, < 8.0.5
- (no CPE)range: >= 7.0.0, < 7.0.19
- (no CPE)range: >= 7.0.0, < 7.0.19
- (no CPE)range: >= 7.0.0, < 7.0.19
- (no CPE)range: >= 7.0.0, < 7.0.19
- (no CPE)range: >= 7.0.0, < 7.0.19
- (no CPE)range: >= 7.0.0, < 7.0.19
- (no CPE)range: >= 7.0.0, < 7.0.19
- (no CPE)range: >= 7.0.0, < 7.0.19
- (no CPE)range: >= 7.0.0, < 7.0.19
- (no CPE)range: < 7.0.19-1.el9_4
- (no CPE)range: < 8.0.5-1.el9_4
- (no CPE)range: < 8.0.5-1.el9_4
- (no CPE)range: < 7.0.19-1.el9_4
- (no CPE)range: < 8.0.5-1.el9_4
- (no CPE)range: < 8.0.105-1.el8_10
- (no CPE)range: < 7.0.19-1.el9_4
- (no CPE)range: < 8.0.5-1.el9_4
- (no CPE)range: < 8.0.5-1.el9_4
- (no CPE)range: < 7.0.19-1.el9_4
- (no CPE)range: < 8.0.5-1.el9_4
- (no CPE)range: < 7.0.19-1.el9_4
- (no CPE)range: < 8.0.5-1.el9_4
- (no CPE)range: < 8.0.5-1.el9_4
- (no CPE)range: < 7.0.119-1.el9_4
- (no CPE)range: < 7.0.119-1.el9_4
- (no CPE)range: < 8.0.105-1.el9_4
- (no CPE)range: < 8.0.105-1.el9_4
- (no CPE)range: < 8.0.105-1.el9_4
- (no CPE)range: < 7.0.19-1.el9_4
- (no CPE)range: < 8.0.5-1.el9_4
- (no CPE)range: < 7.0.119-1.el9_4
- (no CPE)range: < 8.0.105-1.el9_4
- (no CPE)range: < 8.0.105-1.el9_4
- Microsoft/Microsoft Visual Studio 2022 version 17.4v5Range: 17.4.0
- Microsoft/Microsoft Visual Studio 2022 version 17.6v5Range: 17.6.0
- Microsoft/Microsoft Visual Studio 2022 version 17.8v5Range: 17.8.0
- Microsoft/Microsoft Visual Studio 2022 version 17.9v5Range: 17.0
- Microsoft/.NET 7.0v5Range: 7.0.0
- Microsoft/.NET 8.0v5Range: 8.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-hhc7-x9w4-cw47ghsaADVISORY
- msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30046ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2024-30046ghsaADVISORY
- github.com/dotnet/announcements/issues/308ghsaWEB
- github.com/dotnet/aspnetcore/issues/55714ghsaWEB
- github.com/dotnet/aspnetcore/security/advisories/GHSA-hhc7-x9w4-cw47ghsaWEB
News mentions
0No linked articles in our index yet.