First published: Thu Aug 12 2021(Updated: )
.NET Core and Visual Studio Denial of Service Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft .NET | >=5.0<=5.0.8 | |
Microsoft .NET Core | >=2.1<=2.1.28 | |
Microsoft .NET Core | >=3.1<=3.1.17 | |
Microsoft Powershell Core | >=7.0<7.0.7 | |
Microsoft Powershell Core | >=7.1<7.1.4 | |
Microsoft Visual Studio 2017 | >=15.0<=15.9 | |
Microsoft Visual Studio 2019 | >=16.0<=16.10 | |
Microsoft Visual Studio 2019 Macos | =8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-26423 is high with a CVSS score of 7.5.
CVE-2021-26423 affects Microsoft .NET versions 5.0 and earlier, Microsoft .NET Core versions 2.1 and 3.1, Microsoft PowerShell Core versions 7.0 and 7.1, and Microsoft Visual Studio versions 15.0 to 15.9 and 16.0 to 16.10.
CVE-2021-26423 is a denial of service vulnerability in .NET Core and Visual Studio.
To fix CVE-2021-26423, it is recommended to update to the latest patched versions of the affected software.
You can find more information about CVE-2021-26423 in the Microsoft Security Guidance Advisory for CVE-2021-26423: [link](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26423)