CVE-2023-35390

7.8 HIGH

📋 TL;DR

CVE-2023-35390 is a remote code execution vulnerability in .NET and Visual Studio that allows attackers to execute arbitrary code on affected systems. The vulnerability affects systems running vulnerable versions of .NET Framework, .NET Core, and Visual Studio. Attackers can exploit this by tricking users into opening specially crafted files or visiting malicious websites.

💻 Affected Systems

Products:
  • .NET Framework
  • .NET Core
  • Visual Studio
Versions: Multiple versions of .NET Framework, .NET Core, and Visual Studio - see Microsoft advisory for specific affected versions
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both development environments and production systems running .NET applications. The vulnerability exists in how .NET handles certain input validation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Attacker executes malicious code in the context of the current user, potentially installing malware, stealing credentials, or establishing persistence on the system.

🟢

If Mitigated

Limited impact with proper network segmentation, application whitelisting, and least privilege principles in place, potentially containing the attack to isolated segments.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction such as opening a malicious file or visiting a compromised website. No public proof-of-concept has been released at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See Microsoft Security Update Guide for specific patched versions

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390

Restart Required: Yes

Instructions:

1. Apply the latest security updates from Microsoft Update or Windows Update. 2. For .NET Framework, install the latest cumulative updates. 3. For .NET Core and Visual Studio, update to the latest versions. 4. Restart affected systems after patching.

🔧 Temporary Workarounds

Disable vulnerable components

all

Temporarily disable or restrict access to vulnerable .NET components if they are not essential for operations

Application control policies

windows

Implement application whitelisting to prevent execution of unauthorized .NET applications

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems from critical assets
  • Apply strict access controls and monitor for suspicious .NET process execution

🔍 How to Verify

Check if Vulnerable:

Check installed .NET versions and compare against Microsoft's security advisory for affected versions

Check Version:

On Windows: 'wmic product get name,version' or check Add/Remove Programs. On Linux: 'dotnet --info' for .NET Core

Verify Fix Applied:

Verify that security updates have been applied and check that .NET versions match patched versions in Microsoft's advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual .NET process execution patterns
  • Suspicious file access by .NET applications
  • Unexpected network connections from .NET processes

Network Indicators:

  • Unusual outbound connections from .NET applications
  • Traffic patterns indicative of command and control

SIEM Query:

Process creation events where parent process is .NET related and child process is suspicious or unexpected

🔗 References

📤 Share & Export