Impact
Improper input validation in the .NET Framework enables an unauthorized attacker to trigger a denial of service over a network. This flaw can cause application processes to terminate or become unresponsive, resulting in loss of availability and potential interruption to user tasks. The issue is mapped to CWE-366 (Race Condition) and CWE-755 (Unsafe or Insecure Synchronization Mechanism), reflecting the underlying synchronization weaknesses that surface during input handling.)
Affected Systems
The flaw affects multiple Microsoft .NET Framework releases, including versions 3.5, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8, and 4.8.1. Any system that hosts applications built on these framework versions could be impacted, especially where network exposure is possible.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity. The EPSS score is <1%, indicating a very low but non‑zero exploitation probability. The attack vector is inferred to be network‑based, as the description references denial of service over a network. The vulnerability is not listed in the CISA KEV catalog yet, but the high CVSS and potential for remote exploitation warrant prompt remediation.
OpenCVE Enrichment