Microsoft patches critical ASP.NET Core vulnerability on macOS and Linux

Microsoft has released an emergency patch for a high-severity vulnerability in its ASP.NET Core framework, affecting macOS and Linux applications. Tracked as CVE-2026-40372, the flaw allows unauthenticated attackers to gain SYSTEM privileges through forged authentication payloads. The company advises immediate updates and key rotation to fully mitigate risks.

Microsoft released version 10.0.7 of the Microsoft.AspNetCore.DataProtection NuGet package on Tuesday to fix CVE-2026-40372, which carries a severity score of 9.1 out of 10. The issue affects versions 10.0.0 through 10.0.6 and stems from a regression bug in last week's update to 10.0.6. This bug caused faulty cryptographic signature verification during HMAC validation, enabling attackers to forge credentials and elevate privileges on non-Windows systems running ASP.NET Core apps. ASP.NET Core is a high-performance framework for .NET applications on platforms including macOS, Linux, and Docker. The vulnerability leaves devices open to full compromise if exploited during the vulnerable period. Even after patching, legitimately signed tokens issued to attackers—such as session refreshes, API keys, or password reset links—remain valid unless the DataProtection key ring is rotated, Microsoft warned. Affected users include those on macOS or Linux whose applications load version 10.0.6 at runtime, particularly if they do not target Microsoft.NET.Sdk.Web or have certain framework references without opting out of PrunePackageReference. Windows apps are unaffected due to different default encryptors. Microsoft urges updating to 10.0.7 immediately, rotating keys for internet-exposed endpoints, and auditing application artifacts created during vulnerability exposure.

Makala yanayohusiana

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

Imeripotiwa na AI

A critical remote code execution vulnerability has been discovered in multiple BeyondTrust products. The flaw, rated 9.9 out of 10 in severity, allows hackers to run code on affected systems without needing to log in. The issue was reported on February 10, 2026.

Microsoft has released an update to Azure Linux, incorporating the 6.12 Hardware Enablement kernel and optimizations for ARM64 architecture. This version, 3.0.20260204, aims to enhance performance on supported hardware. The changes are detailed in reports from Phoronix.

Imeripotiwa na AI

Daniel Stenberg, creator of the widely used curl program, draws parallels between his project and a cyberattack that nearly succeeded two years ago. In an interview in Huddinge, he stresses the importance of trust in open-source software underpinning the internet. An expert warns he could theoretically shut down half the internet.

Ijumaa, 13. Mwezi wa tatu 2026, 18:03:59

Veeam patches three critical security flaws in backup servers

Jumatano, 18. Mwezi wa pili 2026, 11:16:48

Dell zero-day flaw unpatched for nearly two years

Jumanne, 10. Mwezi wa pili 2026, 12:30:03

Microsoft alerts users to Secure Boot certificates expiring in 2026

Alhamisi, 5. Mwezi wa pili 2026, 15:05:32

Critical flaws discovered in n8n workflow tool

Jumatano, 4. Mwezi wa pili 2026, 10:58:01

More than 40,000 WordPress sites affected by malware flaw

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa