Article Details
Scrape Timestamp (UTC): 2025-10-17 15:40:25.464
Original Article Text
Click to Toggle View
Microsoft fixes highest-severity ASP.NET Core flaw ever. Earlier this week, Microsoft patched a vulnerability that was flagged with the "highest ever" severity rating received by an ASP.NET Core security flaw. This HTTP request smuggling bug (CVE-2025-55315) was found in the Kestrel ASP.NET Core web server, and it enables authenticated attackers to smuggle another HTTP request to hijack other users' credentials or bypass front-end security controls. "An attacker who successfully exploited this vulnerability could view sensitive information such as other user's credentials (Confidentiality) and make changes to file contents on the target server (Integrity), and they might be able to force a crash within the server (Availability)," Microsoft said in a Tuesday advisory. To ensure that their ASP.NET Core applications are secured against potential attacks, Microsoft advises developers and users to take the following measures: To address the vulnerability, Microsoft has released security updates for Microsoft Visual Studio 2022, ASP.NET Core 2.3, ASP.NET Core 8.0, and ASP.NET Core 9.0, as well as the Microsoft.AspNetCore.Server.Kestrel.Core package for ASP.NET Core 2.x apps. As .NET security technical program manager Barry Dorrans explained, the impact of CVE-2025-55315 attacks would depend on the targeted ASP.NET application, and susccesful exploitation could allow the threat actors to log in as a different user (for privilege escalation), make an internal request (in server-side request forgery attacks), bypass cross-site request forgery (CSRF) checks, or perform injection attacks. "But we don't know what's possible because it's dependent on how you've written your app. Thus, we score with the worst possible case in mind, a security feature bypass which changes scope," Dorrans said. "Is that likely? No, probably not unless your application code is doing something odd and skips a bunch of checks that it ought to be making on every request. However please go update." During this month's Patch Tuesday, Microsoft released security updates for 172 flaws, including eight "Critical" vulnerabilities and six zero-day bugs (three of which were exploited in attacks). This week, Microsoft also published KB5066791, a cumulative update that includes the final Windows 10 security updates as the operating system reaches the end of its support lifecycle. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
Microsoft addressed a critical vulnerability (CVE-2025-55315) in the Kestrel ASP.NET Core web server, marked with the highest severity rating for an ASP.NET Core flaw.
The flaw allows authenticated attackers to smuggle HTTP requests, potentially hijacking user credentials and bypassing front-end security measures.
Successful exploitation could lead to unauthorized access, privilege escalation, server-side request forgery, and bypassing cross-site request forgery checks.
Microsoft released security updates for Visual Studio 2022, ASP.NET Core 2.3, 8.0, 9.0, and the Kestrel Core package to mitigate the vulnerability.
The impact of the vulnerability varies based on the targeted application, with the worst-case scenario being a security feature bypass.
During this month's Patch Tuesday, Microsoft released updates for 172 vulnerabilities, including eight critical and six zero-day flaws.
Organizations are urged to apply the updates promptly to protect against potential exploitation and maintain application security.