.NET and Visual Studio Remote Code Execution Vulnerability
Description
.NET and Visual Studio Remote Code Execution Vulnerability
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free vulnerability in ASP.NET Core's Kestrel HTTP/3 implementation can lead to remote code execution on affected .NET 8.0 and 6.0 applications.
Vulnerability
Overview
CVE-2024-35264 is a use-after-free vulnerability (CWE-416) in the ASP.NET Core Kestrel web server's HTTP/3 implementation [1][3]. The flaw occurs when memory is freed but later referenced incorrectly, leading to data corruption that an attacker can exploit for remote code execution [1]. The vulnerability affects .NET 8.0 versions 8.0.0 through 8.0.6, as well as .NET 6.0 with HTTP/3 (which was experimental in that version) [1][3].
Exploitation and
Attack Surface
An attacker can exploit this vulnerability by sending specially crafted HTTP/3 requests to a vulnerable ASP.NET Core application running on Kestrel [1]. No authentication is required, and the attack can be performed remotely over the network, as the HTTP/3 protocol uses QUIC/UDP transport [1]. The prerequisite is that the application has HTTP/3 enabled and is running an affected version of the runtime or packages [1][3].
Impact
Successful exploitation results in data corruption that can potentially lead to remote code execution (RCE) in the context of the application [1][3]. This means an attacker could gain the ability to run arbitrary code, potentially taking full control of the application and underlying server, depending on the application's privileges.
Mitigation
Microsoft has released patched versions of the affected packages in .NET 8.0.7 and .NET 6.0.37 [1][3]. Developers should update their applications to the latest versions of the Microsoft.AspNetCore.App.Runtime packages or the .NET SDK/runtime [1]. There are no known workarounds, and Microsoft has not identified any mitigating factors for this vulnerability [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.AspNetCore.App.Runtime.linux-armNuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.AspNetCore.App.Runtime.linux-arm64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.AspNetCore.App.Runtime.linux-musl-armNuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.AspNetCore.App.Runtime.linux-musl-x64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.AspNetCore.App.Runtime.linux-x64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.AspNetCore.App.Runtime.osx-arm64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.AspNetCore.App.Runtime.osx-x64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.AspNetCore.App.Runtime.win-armNuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.AspNetCore.App.Runtime.win-arm64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.AspNetCore.App.Runtime.win-x64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.AspNetCore.App.Runtime.win-x86NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Affected products
35- osv-coords29 versionspkg:bitnami/dotnetpkg:bitnami/dotnet-sdkpkg:nuget/microsoft.aspnetcore.app.runtime.linux-armpkg:nuget/microsoft.aspnetcore.app.runtime.linux-arm64pkg:nuget/microsoft.aspnetcore.app.runtime.linux-musl-armpkg:nuget/microsoft.aspnetcore.app.runtime.linux-musl-arm64pkg:nuget/microsoft.aspnetcore.app.runtime.linux-musl-x64pkg:nuget/microsoft.aspnetcore.app.runtime.linux-x64pkg:nuget/microsoft.aspnetcore.app.runtime.osx-arm64pkg:nuget/microsoft.aspnetcore.app.runtime.osx-x64pkg:nuget/microsoft.aspnetcore.app.runtime.win-armpkg:nuget/microsoft.aspnetcore.app.runtime.win-arm64pkg:nuget/microsoft.aspnetcore.app.runtime.win-x64pkg:nuget/microsoft.aspnetcore.app.runtime.win-x86pkg:rpm/almalinux/aspnetcore-runtime-8.0pkg:rpm/almalinux/aspnetcore-runtime-dbg-8.0pkg:rpm/almalinux/aspnetcore-targeting-pack-8.0pkg:rpm/almalinux/dotnetpkg:rpm/almalinux/dotnet-apphost-pack-8.0pkg:rpm/almalinux/dotnet-hostpkg:rpm/almalinux/dotnet-hostfxr-8.0pkg:rpm/almalinux/dotnet-runtime-8.0pkg:rpm/almalinux/dotnet-runtime-dbg-8.0pkg:rpm/almalinux/dotnet-sdk-8.0pkg:rpm/almalinux/dotnet-sdk-8.0-source-built-artifactspkg:rpm/almalinux/dotnet-sdk-dbg-8.0pkg:rpm/almalinux/dotnet-targeting-pack-8.0pkg:rpm/almalinux/dotnet-templates-8.0pkg:rpm/almalinux/netstandard-targeting-pack-2.1
>= 8.0.0, < 8.0.7+ 28 more
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 8.0.107-1.el8_10
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 8.0.107-1.el9_4
- (no CPE)range: < 8.0.107-1.el9_4
- (no CPE)range: < 8.0.107-1.el9_4
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 8.0.107-1.el9_4
- (no CPE)range: < 8.0.107-1.el9_4
- Microsoft/Microsoft Visual Studio 2022 version 17.10v5Range: 17.10
- Microsoft/Microsoft Visual Studio 2022 version 17.4v5Range: 17.4.0
- Microsoft/Microsoft Visual Studio 2022 version 17.6v5Range: 17.6.0
- Microsoft/Microsoft Visual Studio 2022 version 17.8v5Range: 17.8.0
- Microsoft/.NET 6.0v5Range: -
- Microsoft/.NET 8.0v5Range: 1.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-chfc-9w6m-75rfghsaADVISORY
- msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35264ghsavendor-advisorypatchWEB
- nvd.nist.gov/vuln/detail/CVE-2024-35264ghsaADVISORY
- github.com/dotnet/aspnetcore/security/advisories/GHSA-chfc-9w6m-75rfghsaWEB
- www.herodevs.com/vulnerability-directory/cve-2024-35264ghsaWEB
News mentions
0No linked articles in our index yet.