Description
Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.
Published: 2026-03-10
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (DoS) via out‑of‑bounds read
Action: Patch
AI Analysis

Impact

An out‑of‑bounds read occurs within the .NET framework, permitting an attacker to trigger a denial‑of‑service condition. The vulnerability is classified as CWE‑125 and allows an unauthorized external actor to interrupt service over a network connection, potentially disrupting application availability.

Affected Systems

Affected components include Microsoft .NET 10.0, Microsoft .NET 9.0 and Microsoft Bcl.Memory. The vulnerability is present in these runtime environments as indicated by the vendor product list and the corresponding CPE identifiers. Systems running these .NET versions may also be impacted when using the Bcl.Memory library.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity, but the EPSS score of less than 1 % shows a low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to send specially crafted input to the .NET runtime over the network, which is likely if the affected application is exposed to external traffic. The risk remains moderate‑high until a patch is applied.

Generated by OpenCVE AI on March 16, 2026 at 23:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Confirm that your operating system is running Microsoft .NET 10.0 or 9.0 with the latest security updates.
  • Check the Microsoft Security Update Guide for a patch that addresses CVE‑2026‑26127 and apply it as soon as it is available.
  • If immediate patching is infeasible, restrict network access to the vulnerable application using firewall rules or a bastion host.

Generated by OpenCVE AI on March 16, 2026 at 23:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-73j8-2gch-69rq .NET Denial of Service Vulnerability
Ubuntu USN Ubuntu USN USN-8085-1 .NET vulnerabilities
History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft bcl.memory
Microsoft windows
CPEs cpe:2.3:a:microsoft:bcl.memory:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft bcl.memory
Microsoft windows

Fri, 13 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:8
cpe:/a:redhat:enterprise_linux:9
cpe:/o:redhat:enterprise_linux:10.1
Vendors & Products Redhat
Redhat enterprise Linux
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft bcl Memory
Vendors & Products Microsoft bcl Memory

Tue, 10 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.
Title .NET Denial of Service Vulnerability
First Time appeared Microsoft
Microsoft .net
Microsoft bcl Memory
Weaknesses CWE-125
CPEs cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:Bcl_memory:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft .net
Microsoft bcl Memory
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C'}


Subscriptions

Apple Macos
Linux Linux Kernel
Microsoft .net Bcl Memory Bcl.memory Bcl Memory Windows
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-03-27T22:33:01.428Z

Reserved: 2026-02-11T15:52:13.912Z

Link: CVE-2026-26127

cve-icon Vulnrichment

Updated: 2026-03-10T18:01:22.602Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T18:18:41.713

Modified: 2026-04-01T20:22:46.643

Link: CVE-2026-26127

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-10T17:05:10Z

Links: CVE-2026-26127 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:34:13Z

Weaknesses