Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical ASP.NET Vulnerability Allows Attacker To Bypass Security Feature Remotely

Posted on October 21, 2025October 21, 2025 By CWS

Microsoft has disclosed a severe safety flaw in ASP.NET Core that permits authenticated attackers to smuggle HTTP requests and evade important protections.

Tracked as CVE-2025-55315, the vulnerability stems from inconsistent dealing with of HTTP requests, a traditional concern referred to as HTTP request/response smuggling.

Launched on October 14, 2025, this flaw impacts builders counting on the favored internet framework for constructing safe purposes.

With a CVSS v3.1 base rating of 9.9 rated as “Crucial” in affect the bug poses dangers to confidentiality, integrity, and even restricted availability of affected methods.

The vulnerability exploits a weak point labeled beneath CWE-444, the place servers misread HTTP requests, permitting attackers to inject malicious payloads.

A licensed person with low privileges can ship a crafted request over the community, bypassing front-end safety controls like internet software firewalls.

This might allow them to hijack different customers’ periods, steal delicate credentials, or alter server information with out detection. Microsoft’s evaluation highlights that profitable exploitation results in excessive confidentiality and integrity losses (C:H, I:H), with low availability affect (A:L), probably inflicting server crashes.

The scope modifications (S:C) imply the assault ripples past the susceptible element, affecting unrelated sources beneath totally different safety authorities.

Exploitation Dangers In Actual-World Eventualities

Attackers want solely low privileges and no person interplay, making this a low-complexity risk accessible by way of the community (AV:N, AC:L, PR:L, UI:N).

Whereas no public exploits exist but Microsoft deems exploitation “much less seemingly” the unproven maturity (E:U) doesn’t diminish the urgency.

Think about a company intranet the place an insider crafts a smuggling request to impersonate an admin, accessing payroll knowledge or injecting malware Or in e-commerce websites, the place smuggled requests may siphon buyer data throughout peak visitors.

The bug hits ASP.NET Core in .NET 8 and later variations, in addition to older .NET 2.3 setups utilizing the Kestrel server. Microsoft confirms no proof of lively exploitation, however the confirmed confidence (RC:C) and official repair (RL:O) underscore rapid motion.

Builders on .NET 8+ ought to apply the newest Microsoft Replace and restart purposes. For .NET 2.3, replace the Microsoft.AspNetCore.Server.Kestrel.Core package deal to model 2.3.6, recompile, and redeploy.

Self-contained apps require recompilation post-update. Broader remediation entails auditing HTTP parsing in customized middleware and enabling strict request validation.

This flaw revives issues over HTTP smuggling, a tactic seen in previous assaults on cloud companies. As distant work expands assault surfaces, organizations should prioritize patching.

Microsoft urges scanning for susceptible deployments and monitoring logs for anomalous requests. With the framework powering hundreds of thousands of internet apps, unpatched methods threat knowledge breaches or compliance violations.

Safety groups ought to combine this into vulnerability administration workflows, particularly given the framework’s position in enterprise stacks.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:ASP.NET, Attacker, Bypass, Critical, Feature, Remotely, Security, Vulnerability

Post navigation

Previous Post: Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers
Next Post: ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration

Related Posts

MAD-CAT Meow Attack Tool to Simulate Real-World Data Corruption Attacks Cyber Security News
Windows 11 24H2 Update Hides the Password Icon in the Sign-in Options on the Lock Screen Cyber Security News
HashiCorp Vault Vulnerability Allow Attackers to Authenticate to Vault Without Valid Credentials Cyber Security News
SesameOp Leveraging OpenAI Assistants API for Stealthy Communication with C2 Servers Cyber Security News
New Whisper Leak Toolkit Exposes User Prompts to Popular AI Agents within Encrypted Traffic Cyber Security News
Threat Actors Employ Clickfix Tactics to Deliver Malicious AppleScripts That Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark