.NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability
Description
Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A man-in-the-middle attacker can downgrade SMTP TLS connections in .NET 8 and 9, forcing unencrypted data disclosure.
Vulnerability
Analysis
The vulnerability lies in the SMTP client implementation of .NET 8.0 (up to version 8.0.20) and .NET 9.0 (up to version 9.0.9) [1][2]. Inadequate encryption strength allows a man-in-the-middle (MITM) attacker to interfere with the TLS negotiation between a .NET SMTP client and an SMTP server. The attacker can prevent the use of TLS, forcing the client to fall back to an unencrypted connection [1][2][3]. This is a downgrade attack that bypasses the intended transport security.
Exploitation
Prerequisites
An attacker must be positioned on the network path between the affected .NET application and the SMTP server, i.e., a MITM position. No special authentication or privileges beyond network access are required. The attack does not need any user interaction beyond the normal operation of the SMTP client [1][3]. There are no mitigating factors identified by Microsoft [2][3].
Impact
A successful attack allows the attacker to eavesdrop on all email communications transmitted by the affected application. Sensitive information such as credentials, message content, and recipient details can be disclosed over the network in plaintext [1]. The confidentiality of data processed by the SMTP client is fully compromised.
Mitigation
Microsoft has released patched versions: .NET 8.0.21 and .NET 9.0.10 [1][2][3]. Developers must update their applications to use these patched runtime packages. For a full list of affected package names (e.g., Microsoft.NetCore.App.Runtime.linux-x64), refer to the advisory tables. No workaround is available [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.NetCore.App.Runtime.linux-armNuGet | >= 9.0.0, < 9.0.10 | 9.0.10 |
Microsoft.NetCore.App.Runtime.linux-arm64NuGet | >= 9.0.0, < 9.0.10 | 9.0.10 |
Microsoft.NetCore.App.Runtime.linux-musl-armNuGet | >= 9.0.0, < 9.0.10 | 9.0.10 |
Microsoft.NetCore.App.Runtime.linux-musl-arm64NuGet | >= 9.0.0, < 9.0.10 | 9.0.10 |
Microsoft.NetCore.App.Runtime.linux-musl-x64NuGet | >= 9.0.0, < 9.0.10 | 9.0.10 |
Microsoft.NetCore.App.Runtime.linux-x64NuGet | >= 9.0.0, < 9.0.10 | 9.0.10 |
Microsoft.NetCore.App.Runtime.osx-arm64NuGet | >= 9.0.0, < 9.0.10 | 9.0.10 |
Microsoft.NetCore.App.Runtime.osx-x64NuGet | >= 9.0.0, < 9.0.10 | 9.0.10 |
Microsoft.NetCore.App.Runtime.win-armNuGet | >= 9.0.0, < 9.0.10 | 9.0.10 |
Microsoft.NetCore.App.Runtime.win-arm64NuGet | >= 9.0.0, < 9.0.10 | 9.0.10 |
Microsoft.NetCore.App.Runtime.win-x64NuGet | >= 9.0.0, < 9.0.10 | 9.0.10 |
Microsoft.NetCore.App.Runtime.win-x86NuGet | >= 9.0.0, < 9.0.10 | 9.0.10 |
Microsoft.NetCore.App.Runtime.linux-armNuGet | >= 8.0.0, < 8.0.21 | 8.0.21 |
Microsoft.NetCore.App.Runtime.linux-arm64NuGet | >= 8.0.0, < 8.0.21 | 8.0.21 |
Microsoft.NetCore.App.Runtime.linux-musl-armNuGet | >= 8.0.0, < 8.0.21 | 8.0.21 |
Microsoft.NetCore.App.Runtime.linux-musl-arm64NuGet | >= 8.0.0, < 8.0.21 | 8.0.21 |
Microsoft.NetCore.App.Runtime.linux-musl-x64NuGet | >= 8.0.0, < 8.0.21 | 8.0.21 |
Microsoft.NetCore.App.Runtime.linux-x64NuGet | >= 8.0.0, < 8.0.21 | 8.0.21 |
Microsoft.NetCore.App.Runtime.osx-arm64NuGet | >= 8.0.0, < 8.0.21 | 8.0.21 |
Microsoft.NetCore.App.Runtime.osx-x64NuGet | >= 8.0.0, < 8.0.21 | 8.0.21 |
Microsoft.NetCore.App.Runtime.win-armNuGet | >= 8.0.0, < 8.0.21 | 8.0.21 |
Microsoft.NetCore.App.Runtime.win-arm64NuGet | >= 8.0.0, < 8.0.21 | 8.0.21 |
Microsoft.NetCore.App.Runtime.win-x64NuGet | >= 8.0.0, < 8.0.21 | 8.0.21 |
Microsoft.NetCore.App.Runtime.win-x86NuGet | >= 8.0.0, < 8.0.21 | 8.0.21 |
Affected products
18- Microsoft/Microsoft .NET Framework 2.0 Service Pack 2v5Range: 2.0.0
- Microsoft/Microsoft .NET Framework 3.0 Service Pack 2v5Range: 3.0.0
- Microsoft/Microsoft .NET Framework 3.5v5Range: 3.5.0
- Microsoft/Microsoft .NET Framework 3.5.1v5Range: 3.5.0
- Microsoft/Microsoft .NET Framework 3.5 AND 4.7.2v5Range: 4.7.0
- Microsoft/Microsoft .NET Framework 3.5 AND 4.8v5Range: 4.8.0
- Microsoft/Microsoft .NET Framework 3.5 AND 4.8.1v5Range: 4.8.1
- Microsoft/Microsoft .NET Framework 4.6.2v5Range: 4.7.0
- Microsoft/Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2v5Range: 4.7.0
- Microsoft/Microsoft .NET Framework 4.8v5Range: 4.8.0
- Microsoft/Microsoft Visual Studio 2022 version 17.10v5Range: 17.10.0
- Microsoft/Microsoft Visual Studio 2022 version 17.12v5Range: 17.12.0
- Microsoft/Microsoft Visual Studio 2022 version 17.14v5Range: 17.14.0
- Microsoft/.NET 8.0v5Range: 8.0.0
- Microsoft/.NET 9.0v5Range: 9.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-gwq6-fmvp-qp68ghsaADVISORY
- msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248ghsavendor-advisorypatchWEB
- github.com/dotnet/announcements/issues/372ghsaWEB
- github.com/dotnet/runtime/issues/120713ghsaWEB
- github.com/dotnet/runtime/security/advisories/GHSA-gwq6-fmvp-qp68ghsaWEB
News mentions
0No linked articles in our index yet.