.NET Remote Code Execution Vulnerability
Description
.NET Remote Code Execution Vulnerability
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
.NET 9.0 Remote Code Execution vulnerability allows an unauthenticated attacker to execute arbitrary code by sending a crafted request to a vulnerable ASP.NET Core web server.
Vulnerability
Overview CVE-2025-21171 is a remote code execution (RCE) vulnerability in .NET 9.0.0 and earlier versions. The issue exists in the .NET runtime's handling of specially crafted requests, potentially allowing an attacker to corrupt memory or trigger arbitrary code execution when processed by a vulnerable web application [1]. Microsoft has not identified any mitigating factors, meaning all affected deployments are at risk.
Attack
Vector An unauthenticated attacker can exploit this vulnerability by sending a malicious HTTP request to a .NET web server running the affected version. No special network position or authentication is required; the attacker only needs network access to the service [1]. The request triggers a flaw in the .NET runtime, leading to memory corruption and code execution.
Impact
If successfully exploited, the attacker can achieve remote code execution in the context of the application pool, potentially gaining full control over the server. This could lead to data theft, service disruption, or further lateral movement within the network [1].
Mitigation
Microsoft released patched versions of .NET 9.0.1 for all platforms (linux, macOS, Windows). Developers should update their runtime and SDK packages to version 9.0.1 or later. Visual Studio users will be prompted to update automatically [1]. The vulnerability only affects .NET 9.0.0 and earlier; no other .NET versions are impacted.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.NetCore.App.Runtime.linux-armNuGet | >= 9.0.0, < 9.0.1 | 9.0.1 |
Microsoft.NetCore.App.Runtime.linux-arm64NuGet | >= 9.0.0, < 9.0.1 | 9.0.1 |
Microsoft.NetCore.App.Runtime.linux-musl-armNuGet | >= 9.0.0, < 9.0.1 | 9.0.1 |
Microsoft.NetCore.App.Runtime.linux-musl-arm64NuGet | >= 9.0.0, < 9.0.1 | 9.0.1 |
Microsoft.NetCore.App.Runtime.linux-musl-x64NuGet | >= 9.0.0, < 9.0.1 | 9.0.1 |
Microsoft.NetCore.App.Runtime.linux-x64NuGet | >= 9.0.0, < 9.0.1 | 9.0.1 |
Microsoft.NetCore.App.Runtime.osx-arm64NuGet | >= 9.0.0, < 9.0.1 | 9.0.1 |
Microsoft.NetCore.App.Runtime.osx-x64NuGet | >= 9.0.0, < 9.0.1 | 9.0.1 |
Microsoft.NetCore.App.Runtime.win-armNuGet | >= 9.0.0, < 9.0.1 | 9.0.1 |
Microsoft.NetCore.App.Runtime.win-arm64NuGet | >= 9.0.0, < 9.0.1 | 9.0.1 |
Microsoft.NetCore.App.Runtime.win-x64NuGet | >= 9.0.0, < 9.0.1 | 9.0.1 |
Microsoft.NetCore.App.Runtime.win-x86NuGet | >= 9.0.0, < 9.0.1 | 9.0.1 |
Affected products
39- osv-coords33 versionspkg:apk/chainguard/dotnet-bootstrap-9pkg:apk/wolfi/dotnet-bootstrap-9pkg:bitnami/dotnetpkg:bitnami/dotnet-sdkpkg:bitnami/powershellpkg:nuget/microsoft.netcore.app.runtime.linux-armpkg:nuget/microsoft.netcore.app.runtime.linux-arm64pkg:nuget/microsoft.netcore.app.runtime.linux-musl-armpkg:nuget/microsoft.netcore.app.runtime.linux-musl-arm64pkg:nuget/microsoft.netcore.app.runtime.linux-musl-x64pkg:nuget/microsoft.netcore.app.runtime.linux-x64pkg:nuget/microsoft.netcore.app.runtime.osx-arm64pkg:nuget/microsoft.netcore.app.runtime.osx-x64pkg:nuget/microsoft.netcore.app.runtime.win-armpkg:nuget/microsoft.netcore.app.runtime.win-arm64pkg:nuget/microsoft.netcore.app.runtime.win-x64pkg:nuget/microsoft.netcore.app.runtime.win-x86pkg:rpm/almalinux/aspnetcore-runtime-9.0pkg:rpm/almalinux/aspnetcore-runtime-dbg-9.0pkg:rpm/almalinux/aspnetcore-targeting-pack-9.0pkg:rpm/almalinux/dotnetpkg:rpm/almalinux/dotnet-apphost-pack-9.0pkg:rpm/almalinux/dotnet-hostpkg:rpm/almalinux/dotnet-hostfxr-9.0pkg:rpm/almalinux/dotnet-runtime-9.0pkg:rpm/almalinux/dotnet-runtime-dbg-9.0pkg:rpm/almalinux/dotnet-sdk-9.0pkg:rpm/almalinux/dotnet-sdk-9.0-source-built-artifactspkg:rpm/almalinux/dotnet-sdk-aot-9.0pkg:rpm/almalinux/dotnet-sdk-dbg-9.0pkg:rpm/almalinux/dotnet-targeting-pack-9.0pkg:rpm/almalinux/dotnet-templates-9.0pkg:rpm/almalinux/netstandard-targeting-pack-2.1
< 9.0.200-r0+ 32 more
- (no CPE)range: < 9.0.200-r0
- (no CPE)range: < 9.0.200-r0
- (no CPE)range: >= 9.0.0, < 9.0.1
- (no CPE)range: >= 9.0.0, < 9.0.100
- (no CPE)range: >= 7.5.0, < 7.5.2
- (no CPE)range: >= 9.0.0, < 9.0.1
- (no CPE)range: >= 9.0.0, < 9.0.1
- (no CPE)range: >= 9.0.0, < 9.0.1
- (no CPE)range: >= 9.0.0, < 9.0.1
- (no CPE)range: >= 9.0.0, < 9.0.1
- (no CPE)range: >= 9.0.0, < 9.0.1
- (no CPE)range: >= 9.0.0, < 9.0.1
- (no CPE)range: >= 9.0.0, < 9.0.1
- (no CPE)range: >= 9.0.0, < 9.0.1
- (no CPE)range: >= 9.0.0, < 9.0.1
- (no CPE)range: >= 9.0.0, < 9.0.1
- (no CPE)range: >= 9.0.0, < 9.0.1
- (no CPE)range: < 9.0.1-1.el8_10
- (no CPE)range: < 9.0.1-1.el8_10
- (no CPE)range: < 9.0.1-1.el8_10
- (no CPE)range: < 9.0.102-1.el8_10
- (no CPE)range: < 9.0.1-1.el8_10
- (no CPE)range: < 9.0.1-1.el8_10
- (no CPE)range: < 9.0.1-1.el8_10
- (no CPE)range: < 9.0.1-1.el8_10
- (no CPE)range: < 9.0.1-1.el8_10
- (no CPE)range: < 9.0.102-1.el8_10
- (no CPE)range: < 9.0.102-1.el8_10
- (no CPE)range: < 9.0.102-1.el8_10
- (no CPE)range: < 9.0.102-1.el8_10
- (no CPE)range: < 9.0.1-1.el8_10
- (no CPE)range: < 9.0.102-1.el8_10
- (no CPE)range: < 9.0.102-1.el8_10
- Microsoft/Microsoft Visual Studio 2022 version 17.10v5Range: 17.10.0
- Microsoft/Microsoft Visual Studio 2022 version 17.12v5Range: 17.12.0
- Microsoft/Microsoft Visual Studio 2022 version 17.6v5Range: 17.6.0
- Microsoft/Microsoft Visual Studio 2022 version 17.8v5Range: 17.8.0
- Microsoft/.NET 9.0v5Range: 9.0.0
- Microsoft/PowerShell 7.5v5Range: 7.5.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-p54p-p3qm-8vgjghsaADVISORY
- msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21171ghsavendor-advisorypatchWEB
- nvd.nist.gov/vuln/detail/CVE-2025-21171ghsaADVISORY
- github.com/dotnet/runtime/security/advisories/GHSA-p54p-p3qm-8vgjghsaWEB
News mentions
0No linked articles in our index yet.