Elevation of Privilege Vulnerability Affects Microsoft Products
CVE-2023-36049

7.6HIGH

Key Information:

Badges

💰 Ransomware👾 Exploit Exists📰 News Worthy

Summary

A vulnerability with high CVSS scores has been identified in the .NET Framework, allowing for the elevation of privilege and security feature bypass. This vulnerability specifically affects FTP operations and allows unauthorized users to write or delete files on the server, potentially leading to data loss, data corruption, or unauthorized access to sensitive information. Microsoft has released patches to address the flaws, and users are urged to apply the updates promptly in order to safeguard against potential attacks. The exploitation of these vulnerabilities could have a significant impact on affected systems, especially those relying on the .NET Framework for FTP operations.

Affected Version(s)

.NET 6.0 Unknown 6.0.0 < 6.0.25

.NET 7.0 Unknown 7.0.0 < 7.0.14

.NET 8.0 Unknown 1.0.0 < 8.0.0

News Articles

Veeam VBR 12.1 CVE-2023-36558 and CVE-2023-36049 Vulnerabilities | Veeam Community Resource Hub

Today, I noticed there are two fresh vulnerabilities on the VBR12.1 Manager and console servers. Certain .net core requirements are installed when the p...

10 months ago

Microsoft .NET Framework & Visual Studio Flaw Let Attackers Write or Delete Files

A vulnerability, CVE-2023-36049 has been identified in the Microsoft .NET Framework & Visual Studio, posing a serious threat to the integrity.

10 months ago

Zero Day Initiative — CVE-2023-36049: Microsoft .NET CRLF Injection Arbitrary File Write/Deletion Vulnerability

In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Justin Hung and Yazhi Wang of the Trend Micro Research Team detail a recently patched privilege escalation vulnerability in .NET Framework and Visual Studio. This bug was originally discovered by Piotr Bazydło of T

10 months ago

References

EPSS Score

0% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.6
Severity:
HIGH
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by Zero Day Initiative

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre DatabaseMicrosoft Feed3 News Article(s)
.