Microsoft patches critical ASP.NET Core vulnerability on macOS and Linux

Microsoft has released an emergency patch for a high-severity vulnerability in its ASP.NET Core framework, affecting macOS and Linux applications. Tracked as CVE-2026-40372, the flaw allows unauthenticated attackers to gain SYSTEM privileges through forged authentication payloads. The company advises immediate updates and key rotation to fully mitigate risks.

Microsoft released version 10.0.7 of the Microsoft.AspNetCore.DataProtection NuGet package on Tuesday to fix CVE-2026-40372, which carries a severity score of 9.1 out of 10. The issue affects versions 10.0.0 through 10.0.6 and stems from a regression bug in last week's update to 10.0.6. This bug caused faulty cryptographic signature verification during HMAC validation, enabling attackers to forge credentials and elevate privileges on non-Windows systems running ASP.NET Core apps. ASP.NET Core is a high-performance framework for .NET applications on platforms including macOS, Linux, and Docker. The vulnerability leaves devices open to full compromise if exploited during the vulnerable period. Even after patching, legitimately signed tokens issued to attackers—such as session refreshes, API keys, or password reset links—remain valid unless the DataProtection key ring is rotated, Microsoft warned. Affected users include those on macOS or Linux whose applications load version 10.0.6 at runtime, particularly if they do not target Microsoft.NET.Sdk.Web or have certain framework references without opting out of PrunePackageReference. Windows apps are unaffected due to different default encryptors. Microsoft urges updating to 10.0.7 immediately, rotating keys for internet-exposed endpoints, and auditing application artifacts created during vulnerability exposure.

相关文章

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

由 AI 报道

A critical remote code execution vulnerability has been discovered in multiple BeyondTrust products. The flaw, rated 9.9 out of 10 in severity, allows hackers to run code on affected systems without needing to log in. The issue was reported on February 10, 2026.

Microsoft has released an update to Azure Linux, incorporating the 6.12 Hardware Enablement kernel and optimizations for ARM64 architecture. This version, 3.0.20260204, aims to enhance performance on supported hardware. The changes are detailed in reports from Phoronix.

由 AI 报道

Daniel Stenberg, creator of the widely used curl program, draws parallels between his project and a cyberattack that nearly succeeded two years ago. In an interview in Huddinge, he stresses the importance of trust in open-source software underpinning the internet. An expert warns he could theoretically shut down half the internet.

此网站使用 cookie

我们使用 cookie 进行分析以改进我们的网站。阅读我们的 隐私政策 以获取更多信息。
拒绝