CVE-2025-21176
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
17Public Exploits
0Exploited in Wild
-Decision
Descriptions
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
A remote code execution vulnerability was found in .NET. This flaw allows an attacker to load a specially crafted file in .NET.
It was discovered that .NET did not properly handle input provided to its Convert.TryToHexString method. An attacker could possibly use this issue to execute arbitrary code. It was discovered that .NET did not properly handle an integer overflow when processing certain specially crafted files. An attacker could possibly use this issue to execute arbitrary code. Daniel Plaisted and Noah Gilson discovered that .NET insecurely handled temporary file usage which could result in malicious package dependency injection. An attacker could possibly use this issue to elevate privileges.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-12-05 CVE Reserved
- 2025-01-14 CVE Published
- 2025-03-30 EPSS Updated
- 2025-04-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-126: Buffer Over-read
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|