CVE-2024-20672

7.5 HIGH

📋 TL;DR

This CVE describes a denial of service vulnerability in .NET that allows attackers to crash affected applications by sending specially crafted requests. It affects systems running vulnerable versions of .NET Core and .NET Framework. The vulnerability requires the attacker to be able to send requests to the vulnerable application.

💻 Affected Systems

Products:
  • .NET Core
  • .NET Framework
Versions: Specific versions as detailed in Microsoft advisory (check vendor advisory for exact ranges)
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects applications using vulnerable .NET runtime versions regardless of application code. All configurations using affected .NET versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application/service outage leading to business disruption, data loss from interrupted transactions, and potential cascading failures in dependent systems.

🟠

Likely Case

Temporary service unavailability requiring application restart, degraded performance for legitimate users, and potential reputational damage.

🟢

If Mitigated

Minimal impact with proper rate limiting, request validation, and monitoring allowing quick detection and response to attack attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted requests to vulnerable endpoints but does not require authentication. Attack complexity is low once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific patched versions

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20672

Restart Required: Yes

Instructions:

1. Review Microsoft Security Update Guide for CVE-2024-20672. 2. Identify affected .NET versions in your environment. 3. Apply the latest security updates from Microsoft. 4. Restart affected applications/services. 5. Test functionality after patching.

🔧 Temporary Workarounds

Implement Rate Limiting

all

Configure rate limiting on application endpoints to restrict request frequency and mitigate DoS attempts

Request Validation

all

Implement input validation and request size limits to reject malformed requests before they reach vulnerable code

🧯 If You Can't Patch

  • Implement network-level protections like WAF rules to block suspicious request patterns
  • Deploy additional monitoring and alerting for application crashes or performance degradation

🔍 How to Verify

Check if Vulnerable:

Check .NET runtime version using 'dotnet --info' or examine application runtime version in Windows registry/package managers

Check Version:

dotnet --info (for .NET Core) or check Windows Update history/registry for .NET Framework

Verify Fix Applied:

Verify patched .NET version is installed and application restarted successfully

📡 Detection & Monitoring

Log Indicators:

  • Sudden increase in application crashes
  • Unusual request patterns or malformed requests
  • High CPU/memory usage followed by service failure

Network Indicators:

  • Spike in incoming requests to specific endpoints
  • Requests with unusual payloads or headers

SIEM Query:

Example: (event_type:application_crash AND process_name:dotnet) OR (http_request_count > threshold AND http_status:500)

🔗 References

📤 Share & Export