The issue, tracked as CVE‑2026‑26127, was addressed during Microsoft’s March 2026 Patch Tuesday security updates.
The vulnerability affects applications running on .NET 9.0 and .NET 10.0 across Windows, macOS, and Linux systems.
Security researchers warn that while the flaw does not enable remote code execution, it can still be exploited to disrupt services by repeatedly crashing vulnerable applications.
CVE‑2026‑26127 has been assigned a CVSS v3.1 score of 7.5, classifying it as an “Important” security issue. The vulnerability is categorized under CWE‑125, which refers to an out‑of‑bounds read weakness.
Key vulnerability details include:
The vulnerability was publicly disclosed before a patch was available, making it a zero‑day issue. However, Microsoft reported that there was no evidence of active exploitation in the wild at the time the patch was released.
According to Microsoft’s security advisory, the flaw originates from improper bounds checking in the .NET runtime and the Microsoft.Bcl.Memory library.
The problem occurs when an application processes malformed Base64Url input data. In affected versions, the framework fails to properly validate the size and boundaries of the data buffer during decoding. As a result, the application may attempt to read memory beyond the allocated buffer.
This out‑of‑bounds read does not directly allow attackers to execute code or steal data. Instead, it can force the targeted .NET process to crash, causing service interruptions.
Attackers could repeatedly send malicious requests that crash applications, effectively preventing legitimate users from accessing services. This could impact:
Even though the vulnerability only causes service crashes, continuous exploitation could lead to extended downtime, financial losses, and damage to customer trust.
Security researchers also warn that repeated service crashes or forced restarts could expose infrastructure to other security risks or operational failures.
Microsoft has released security updates to fix the vulnerability, and organizations are strongly encouraged to apply patches immediately.
Recommended mitigation steps include:
Prompt patching and proactive monitoring are critical to preventing attackers from exploiting this vulnerability to disrupt business‑critical services.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Critical Microsoft .NET Zero-Day Vulnerability Allows DoS Attacks appeared first on Cyber Security News.
Emily Blunt, Cillian Murphy, Millicent Simmonds, and Noah Jupe are officially reprising their roles for…
Whether you’re after a new Apple Watch Ultra or want to add a few new…
Sony's upgraded PlayStation Spectral Super Resolution (PSSR) technology is rolling out to several titles on…
There's no better time to dive into the world of immersive VR gaming. AliExpress is…
Krafton has been ordered to reinstate the former boss of Subnautica 2 studio Unknown Worlds…
Tje GeForce RTX 5080 graphics card will allow you to run all of the latest…
This website uses cookies.