CVE-2025-21173

7.3 HIGH

📋 TL;DR

This CVE describes a privilege escalation vulnerability in .NET that allows authenticated attackers to elevate their privileges on affected systems. It affects systems running vulnerable versions of .NET where an attacker has initial access. The vulnerability could allow attackers to gain higher privileges than intended.

💻 Affected Systems

Products:
  • .NET Framework
  • .NET Core
  • .NET
Versions: Specific versions to be confirmed via Microsoft advisory
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where .NET is installed and applications run with vulnerable .NET versions. Exact version ranges should be verified from Microsoft's advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM/root privileges, leading to complete system compromise, data theft, lateral movement, and persistence establishment.

🟠

Likely Case

Authenticated users could elevate from standard user to administrator privileges, enabling unauthorized access to sensitive data and system modifications.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to authorized users gaining slightly elevated privileges within their authorized scope.

🌐 Internet-Facing: LOW - This requires authenticated access, making direct internet exploitation unlikely without prior compromise.
🏢 Internal Only: MEDIUM - Internal authenticated users could exploit this to gain unauthorized privileges, posing insider threat risks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of vulnerable .NET components. Exploitation likely involves crafted .NET applications or runtime manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: To be determined from Microsoft's security update

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21173

Restart Required: No

Instructions:

1. Check Microsoft's security advisory for exact patch versions. 2. Apply the latest .NET security updates via Windows Update or package manager. 3. Update .NET SDK and runtime on development and production systems. 4. Test applications with updated .NET versions before deployment.

🔧 Temporary Workarounds

Principle of Least Privilege Enforcement

all

Restrict user privileges to minimum required levels to limit impact if exploited

Application Whitelisting

Windows

Restrict execution of unauthorized .NET applications

🧯 If You Can't Patch

  • Implement strict access controls and monitor for privilege escalation attempts
  • Isolate systems with vulnerable .NET versions from critical assets and networks

🔍 How to Verify

Check if Vulnerable:

Check installed .NET versions and compare against Microsoft's vulnerable version list in the advisory

Check Version:

Windows: 'dotnet --version' or 'Get-ChildItem "HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP" -Recurse | Get-ItemProperty -Name Version -ErrorAction SilentlyContinue'

Verify Fix Applied:

Verify .NET version is updated to patched version specified in Microsoft advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unusual .NET runtime process creation with elevated privileges
  • Security log events showing user privilege changes

Network Indicators:

  • Unusual outbound connections from .NET processes with elevated privileges

SIEM Query:

Example: 'process.name:dotnet AND event.action:privilege_escalation' or Windows Security Event ID 4672 (Special privileges assigned to new logon)

🔗 References

📤 Share & Export