CVE-2025-26682

7.5 HIGH

📋 TL;DR

This CVE describes a resource exhaustion vulnerability in ASP.NET Core where an attacker can send specially crafted requests to consume excessive server resources without proper throttling. This allows denial of service attacks against affected web applications. Any ASP.NET Core application using vulnerable versions is affected.

💻 Affected Systems

Products:
  • ASP.NET Core
Versions: Specific versions will be detailed in Microsoft's advisory
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All ASP.NET Core applications using default configurations are vulnerable unless specific resource limits are configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to resource exhaustion, potentially affecting multiple applications on the same server.

🟠

Likely Case

Degraded performance and intermittent service disruptions under targeted attack.

🟢

If Mitigated

Minimal impact with proper rate limiting and resource monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and can be exploited with simple HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Will be specified in Microsoft's security update

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26682

Restart Required: Yes

Instructions:

1. Check Microsoft's security advisory for affected versions
2. Apply the latest security update for ASP.NET Core
3. Restart affected applications and services
4. Test application functionality post-update

🔧 Temporary Workarounds

Implement Rate Limiting

all

Configure ASP.NET Core rate limiting middleware to restrict request frequency per client

Add app.UseRateLimiter() in Program.cs with appropriate policies

Configure Request Limits

all

Set maximum request size and timeout limits in Kestrel configuration

Configure in appsettings.json or Program.cs with Limits.MaxRequestBodySize, Limits.KeepAliveTimeout

🧯 If You Can't Patch

  • Implement network-level rate limiting using WAF or load balancer
  • Deploy additional monitoring for resource consumption anomalies

🔍 How to Verify

Check if Vulnerable:

Check ASP.NET Core version against Microsoft's advisory for affected versions

Check Version:

dotnet --info | findstr "ASP.NET Core"

Verify Fix Applied:

Verify ASP.NET Core version is updated to patched version and test with simulated attack patterns

📡 Detection & Monitoring

Log Indicators:

  • Sudden spikes in memory/CPU usage
  • Increased error rates for 503/429 responses
  • Unusual number of requests from single IPs

Network Indicators:

  • High volume of similar requests to ASP.NET endpoints
  • Abnormal request patterns bypassing normal user flows

SIEM Query:

source="iis" OR source="aspnet" (memory_usage > 90% OR cpu_usage > 90%) AND request_count > 1000

🔗 References

📤 Share & Export