VYPR
Critical severityNVD Advisory· Published Jul 9, 2024· Updated Feb 10, 2026

.NET and Visual Studio Remote Code Execution Vulnerability

CVE-2024-35264

Description

.NET and Visual Studio Remote Code Execution Vulnerability

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free vulnerability in ASP.NET Core's Kestrel HTTP/3 implementation can lead to remote code execution on affected .NET 8.0 and 6.0 applications.

Vulnerability

Overview

CVE-2024-35264 is a use-after-free vulnerability (CWE-416) in the ASP.NET Core Kestrel web server's HTTP/3 implementation [1][3]. The flaw occurs when memory is freed but later referenced incorrectly, leading to data corruption that an attacker can exploit for remote code execution [1]. The vulnerability affects .NET 8.0 versions 8.0.0 through 8.0.6, as well as .NET 6.0 with HTTP/3 (which was experimental in that version) [1][3].

Exploitation and

Attack Surface

An attacker can exploit this vulnerability by sending specially crafted HTTP/3 requests to a vulnerable ASP.NET Core application running on Kestrel [1]. No authentication is required, and the attack can be performed remotely over the network, as the HTTP/3 protocol uses QUIC/UDP transport [1]. The prerequisite is that the application has HTTP/3 enabled and is running an affected version of the runtime or packages [1][3].

Impact

Successful exploitation results in data corruption that can potentially lead to remote code execution (RCE) in the context of the application [1][3]. This means an attacker could gain the ability to run arbitrary code, potentially taking full control of the application and underlying server, depending on the application's privileges.

Mitigation

Microsoft has released patched versions of the affected packages in .NET 8.0.7 and .NET 6.0.37 [1][3]. Developers should update their applications to the latest versions of the Microsoft.AspNetCore.App.Runtime packages or the .NET SDK/runtime [1]. There are no known workarounds, and Microsoft has not identified any mitigating factors for this vulnerability [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Microsoft.AspNetCore.App.Runtime.linux-armNuGet
>= 8.0.0, < 8.0.78.0.7
Microsoft.AspNetCore.App.Runtime.linux-arm64NuGet
>= 8.0.0, < 8.0.78.0.7
Microsoft.AspNetCore.App.Runtime.linux-musl-armNuGet
>= 8.0.0, < 8.0.78.0.7
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64NuGet
>= 8.0.0, < 8.0.78.0.7
Microsoft.AspNetCore.App.Runtime.linux-musl-x64NuGet
>= 8.0.0, < 8.0.78.0.7
Microsoft.AspNetCore.App.Runtime.linux-x64NuGet
>= 8.0.0, < 8.0.78.0.7
Microsoft.AspNetCore.App.Runtime.osx-arm64NuGet
>= 8.0.0, < 8.0.78.0.7
Microsoft.AspNetCore.App.Runtime.osx-x64NuGet
>= 8.0.0, < 8.0.78.0.7
Microsoft.AspNetCore.App.Runtime.win-armNuGet
>= 8.0.0, < 8.0.78.0.7
Microsoft.AspNetCore.App.Runtime.win-arm64NuGet
>= 8.0.0, < 8.0.78.0.7
Microsoft.AspNetCore.App.Runtime.win-x64NuGet
>= 8.0.0, < 8.0.78.0.7
Microsoft.AspNetCore.App.Runtime.win-x86NuGet
>= 8.0.0, < 8.0.78.0.7

Affected products

35

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.