Microsoft Releases Urgent Update to Address ASP.NET Vulnerability on macOS and Linux

Microsoft has issued an emergency patch to address a critical vulnerability in its ASP.NET Core framework, which could allow unauthenticated attackers to gain SYSTEM-level privileges on devices running Linux or macOS applications. This vulnerability, identified as CVE-2026-40372, impacts versions 10.0.0 through 10.0.6 of the Microsoft.AspNetCore.DataProtection NuGet package, an essential component of the framework.

The flaw results from inadequate verification of cryptographic signatures, enabling attackers to exploit HMAC validation processes. This vulnerability poses a substantial risk, as it could allow attackers to fabricate authentication payloads, threatening the integrity and authenticity of communications between clients and servers.

Business owners utilizing vulnerable versions of the framework may have unknowingly exposed their systems to significant threats. Even after applying the patch, organizations might remain at risk if they fail to invalidate authentication credentials created by attackers during the period of exposure. Microsoft warns that if malicious actors leveraged this vulnerability, they could have tricked applications into generating legitimate, signed tokens, such as session refresh tokens or API keys, which would still retain their validity post-update unless appropriate action is taken to rotate the DataProtection key ring.

ASP.NET Core is described by Microsoft as a high-performance framework designed to support .NET applications across multiple platforms, including Windows, macOS, Linux, and Docker. This open-source package aims to facilitate rapid evolution of runtime components, APIs, and compilers while providing a stable environment for developers.

Organizations should be particularly vigilant in the wake of this incident. The tactics that attackers could have deployed during this exploitation align with several techniques outlined in the MITRE ATT&CK framework, particularly those pertaining to initial access and privilege escalation. By understanding these potential methods, business owners can better safeguard their environments and mitigate future risks.

In light of this scenario, the urgency for organizations to maintain a proactive stance on security is clearer than ever. Timely patching and regular audits of authentication credentials are essential measures in order to protect against ongoing and future vulnerabilities. Companies that have utilized affected versions must evaluate their security posture and take corrective actions to ensure their systems remain resilient against potential threats.

Source