Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical ASP.NET Vulnerability Allows Attacker To Bypass Security Feature Remotely

Posted on October 21, 2025October 21, 2025 By CWS

Microsoft has disclosed a severe safety flaw in ASP.NET Core that permits authenticated attackers to smuggle HTTP requests and evade important protections.

Tracked as CVE-2025-55315, the vulnerability stems from inconsistent dealing with of HTTP requests, a traditional concern referred to as HTTP request/response smuggling.

Launched on October 14, 2025, this flaw impacts builders counting on the favored internet framework for constructing safe purposes.

With a CVSS v3.1 base rating of 9.9 rated as “Crucial” in affect the bug poses dangers to confidentiality, integrity, and even restricted availability of affected methods.

The vulnerability exploits a weak point labeled beneath CWE-444, the place servers misread HTTP requests, permitting attackers to inject malicious payloads.

A licensed person with low privileges can ship a crafted request over the community, bypassing front-end safety controls like internet software firewalls.

This might allow them to hijack different customers’ periods, steal delicate credentials, or alter server information with out detection. Microsoft’s evaluation highlights that profitable exploitation results in excessive confidentiality and integrity losses (C:H, I:H), with low availability affect (A:L), probably inflicting server crashes.

The scope modifications (S:C) imply the assault ripples past the susceptible element, affecting unrelated sources beneath totally different safety authorities.

Exploitation Dangers In Actual-World Eventualities

Attackers want solely low privileges and no person interplay, making this a low-complexity risk accessible by way of the community (AV:N, AC:L, PR:L, UI:N).

Whereas no public exploits exist but Microsoft deems exploitation “much less seemingly” the unproven maturity (E:U) doesn’t diminish the urgency.

Think about a company intranet the place an insider crafts a smuggling request to impersonate an admin, accessing payroll knowledge or injecting malware Or in e-commerce websites, the place smuggled requests may siphon buyer data throughout peak visitors.

The bug hits ASP.NET Core in .NET 8 and later variations, in addition to older .NET 2.3 setups utilizing the Kestrel server. Microsoft confirms no proof of lively exploitation, however the confirmed confidence (RC:C) and official repair (RL:O) underscore rapid motion.

Builders on .NET 8+ ought to apply the newest Microsoft Replace and restart purposes. For .NET 2.3, replace the Microsoft.AspNetCore.Server.Kestrel.Core package deal to model 2.3.6, recompile, and redeploy.

Self-contained apps require recompilation post-update. Broader remediation entails auditing HTTP parsing in customized middleware and enabling strict request validation.

This flaw revives issues over HTTP smuggling, a tactic seen in previous assaults on cloud companies. As distant work expands assault surfaces, organizations should prioritize patching.

Microsoft urges scanning for susceptible deployments and monitoring logs for anomalous requests. With the framework powering hundreds of thousands of internet apps, unpatched methods threat knowledge breaches or compliance violations.

Safety groups ought to combine this into vulnerability administration workflows, particularly given the framework’s position in enterprise stacks.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:ASP.NET, Attacker, Bypass, Critical, Feature, Remotely, Security, Vulnerability

Post navigation

Previous Post: Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers
Next Post: ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration

Related Posts

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024 Cyber Security News
Azure Active Directory Vulnerability Exposes credentials and Enables Attackers to Deploy Malicious Apps Cyber Security News
Cyber Attacks Targeting Education Sector Surges Following Back-to-School Season Cyber Security News
Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence Cyber Security News
CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks Cyber Security News
AI Red Teaming Tool “Red AI Range” Discovers, Analyze, and Mitigate  Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark