CVE-2022-21986
📋 TL;DR
CVE-2022-21986 is a denial of service vulnerability in .NET Core and .NET 5/6 that allows attackers to crash applications by sending specially crafted requests. This affects web applications and services built with affected .NET versions. The vulnerability can be exploited remotely without authentication.
💻 Affected Systems
- .NET Core
- .NET 5
- .NET 6
📦 What is this software?
.net by Microsoft
.net by Microsoft
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Complete application/service outage leading to business disruption, data loss, and potential cascading failures in dependent systems.
Likely Case
Service disruption causing downtime, degraded performance, and potential loss of availability for web applications.
If Mitigated
Minimal impact with proper network segmentation, rate limiting, and updated systems.
🎯 Exploit Status
Microsoft has confirmed the vulnerability is remotely exploitable without authentication. Proof-of-concept code has been published.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: .NET 6.0.2, .NET 5.0.14, .NET Core 3.1.22
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21986
Restart Required: Yes
Instructions:
1. Identify affected .NET installations. 2. Download and install the appropriate security update from Microsoft. 3. Restart affected applications/services. 4. Redeploy applications with updated runtime if using self-contained deployments.
🔧 Temporary Workarounds
Rate Limiting
allImplement request rate limiting to reduce impact of DoS attempts
Web Application Firewall Rules
allConfigure WAF to block suspicious patterns that might trigger the vulnerability
🧯 If You Can't Patch
- Implement network segmentation to isolate vulnerable systems
- Deploy additional monitoring and alerting for application crashes
🔍 How to Verify
Check if Vulnerable:
Check .NET runtime version using 'dotnet --info' or examine application runtime version
Check Version:
dotnet --info | findstr Version
Verify Fix Applied:
Verify installed .NET version is 6.0.2, 5.0.14, or 3.1.22 or later
📡 Detection & Monitoring
Log Indicators:
- Application crashes with .NET runtime errors
- Unusual spike in failed requests
- Process termination events
Network Indicators:
- Spike in incoming requests to .NET applications
- Unusual traffic patterns from single sources
SIEM Query:
source="*.log" ("crash" OR "terminated" OR "unhandled exception") AND ("dotnet" OR ".NET" OR "coreclr")