Description
Loop with unreachable exit condition ('infinite loop') in .NET, .NET Framework, Visual Studio allows an unauthorized attacker to deny service over a network.
Published: 2026-04-14
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via infinite loop in .NET components
Action: Patch
AI Analysis

Impact

An unreachable exit condition creates an infinite loop in .NET, .NET Framework and Visual Studio code paths. The constantly spinning loop consumes CPU resources, rendering the affected application or service unresponsive and effectively denying service to legitimate users. The weakness is identified as improper input handling (CWE-20), resource exhaustion (CWE-400), infinite loop (CWE-835), and improper data flow (CWE-776).

Affected Systems

Microsoft .NET 10.0, .NET 9.0, .NET 8.0, .NET Framework 3.5, .NET Framework 3.5 with 4.7.2, .NET Framework 4.6.2/4.7/4.7.1/4.7.2, .NET Framework 4.8, and associated Visual Studio products are potentially impacted, but only the product names are listed; specific affected sub‑versions were not supplied.

Risk and Exploitability

The CVSS score of 7.5 denotes a high risk level, and no EPSS data is available. The vulnerability is not currently in the CISA KEV catalog. The primary attack vector is over the network, where an unauthenticated attacker can trigger the vulnerable code path to induce the infinite loop. Successful exploitation will lead to resource exhaustion and denial of service for authorized users. Because the vulnerability can be triggered remotely without requiring privileged credentials, the likelihood of exploitation remains significant until a patch is applied.

Generated by OpenCVE AI on April 15, 2026 at 01:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Microsoft security update for CVE-2026-33116 to all affected .NET runtime versions.
  • Configure network access controls to limit exposure of vulnerable services to trusted networks only.
  • Implement application‑level throttling or monitoring to detect repeated requests that could trigger the infinite loop and temporarily block offending IP addresses.

Generated by OpenCVE AI on April 15, 2026 at 01:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-37gx-xxp4-5rgx Microsoft Security Advisory CVE-2026-33116 – .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft .net Framework
Vendors & Products Microsoft .net Framework

Wed, 15 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-776
References
Metrics threat_severity

None

threat_severity

Important


Tue, 14 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Loop with unreachable exit condition ('infinite loop') in .NET, .NET Framework, Visual Studio allows an unauthorized attacker to deny service over a network.
Title .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
First Time appeared Microsoft
Microsoft .net
Weaknesses CWE-20
CWE-400
CWE-835
CPEs cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft .net
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft .net .net Framework
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-15T21:54:44.474Z

Reserved: 2026-03-17T20:15:23.721Z

Link: CVE-2026-33116

cve-icon Vulnrichment

Updated: 2026-04-14T19:48:32.945Z

cve-icon NVD

Status : Received

Published: 2026-04-14T18:17:33.903

Modified: 2026-04-14T18:17:33.903

Link: CVE-2026-33116

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-14T18:38:58Z

Links: CVE-2026-33116 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:02:40Z