First published: Thu Aug 12 2021(Updated: )
.NET Core and Visual Studio Denial of Service Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft .NET Framework | >=5.0<=5.0.8 | |
Microsoft .NET Core SDK | >=2.1<=2.1.28 | |
Microsoft .NET Core SDK | >=3.1<=3.1.17 | |
PowerShell Core | >=7.0<7.0.7 | |
PowerShell Core | >=7.1<7.1.4 | |
Visual Studio Professional 2017 | >=15.0<=15.9 | |
Visual Studio Professional 2019 | >=16.0<=16.10 | |
Microsoft Visual Studio 2019 for Mac | =8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-26423 is high with a CVSS score of 7.5.
CVE-2021-26423 affects Microsoft .NET versions 5.0 and earlier, Microsoft .NET Core versions 2.1 and 3.1, Microsoft PowerShell Core versions 7.0 and 7.1, and Microsoft Visual Studio versions 15.0 to 15.9 and 16.0 to 16.10.
CVE-2021-26423 is a denial of service vulnerability in .NET Core and Visual Studio.
To fix CVE-2021-26423, it is recommended to update to the latest patched versions of the affected software.
You can find more information about CVE-2021-26423 in the Microsoft Security Guidance Advisory for CVE-2021-26423: [link](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26423)