Description
Concurrent execution using shared resource with improper synchronization ('race condition') in .NET Framework allows an unauthorized attacker to deny service over a network.
Published: 2026-04-14
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

A race condition in the .NET Framework’s handling of concurrent execution with a shared resource can be triggered by an unauthorized attacker, causing a denial of service. The flaw stems from improper synchronization and is categorized as CWE‑362 and CWE‑821. This flaw can lead to application stalls or crashes, making the service unavailable to legitimate users.

Affected Systems

Microsoft .NET Framework versions 3.5, 4.7.2, 4.8 and 4.8.1 are affected. Any application built on these runtimes and deployed on Windows systems may be vulnerable if the vulnerable framework is present.

Risk and Exploitability

This vulnerability has a CVSS score of 5.9, placing it in the moderate severity range. EPSS data is not available, and the flaw is not listed in the CISA KEV catalog, indicating no known widespread exploits yet. The likely attack vector is over a network, where a remote attacker could send crafted requests to trigger the race condition. Successful exploitation would result in a denial of service for actual users of the affected application.

Generated by OpenCVE AI on April 15, 2026 at 01:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Patch Microsoft .NET Framework to the latest security update provided by Microsoft via Windows Update or the Microsoft Update Catalog.
  • If immediate patching is not possible, isolate the vulnerable application in a sandboxed environment or container to limit resource access and prevent denial of service impact on other services.
  • Monitor application performance and logs for abnormal CPU or memory spikes that could indicate exploitation attempts; consider implementing rate limiting or watchdog mechanisms.

Generated by OpenCVE AI on April 15, 2026 at 01:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft .net Framework
Vendors & Products Microsoft .net Framework

Wed, 15 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-821
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Concurrent execution using shared resource with improper synchronization ('race condition') in .NET Framework allows an unauthorized attacker to deny service over a network.
Title .NET Framework Denial of Service Vulnerability
First Time appeared Microsoft
Microsoft .net
Weaknesses CWE-362
CPEs cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft .net
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft .net .net Framework
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-15T21:54:42.076Z

Reserved: 2026-03-11T01:49:58.662Z

Link: CVE-2026-32226

cve-icon Vulnrichment

Updated: 2026-04-14T19:03:37.746Z

cve-icon NVD

Status : Received

Published: 2026-04-14T18:17:31.190

Modified: 2026-04-14T18:17:31.190

Link: CVE-2026-32226

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-14T16:57:44Z

Links: CVE-2026-32226 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T15:00:06Z

Weaknesses