Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical ASP.NET Vulnerability Allows Attacker To Bypass Security Feature Remotely

Posted on October 21, 2025October 21, 2025 By CWS

Microsoft has disclosed a severe safety flaw in ASP.NET Core that permits authenticated attackers to smuggle HTTP requests and evade important protections.

Tracked as CVE-2025-55315, the vulnerability stems from inconsistent dealing with of HTTP requests, a traditional concern referred to as HTTP request/response smuggling.

Launched on October 14, 2025, this flaw impacts builders counting on the favored internet framework for constructing safe purposes.

With a CVSS v3.1 base rating of 9.9 rated as “Crucial” in affect the bug poses dangers to confidentiality, integrity, and even restricted availability of affected methods.

The vulnerability exploits a weak point labeled beneath CWE-444, the place servers misread HTTP requests, permitting attackers to inject malicious payloads.

A licensed person with low privileges can ship a crafted request over the community, bypassing front-end safety controls like internet software firewalls.

This might allow them to hijack different customers’ periods, steal delicate credentials, or alter server information with out detection. Microsoft’s evaluation highlights that profitable exploitation results in excessive confidentiality and integrity losses (C:H, I:H), with low availability affect (A:L), probably inflicting server crashes.

The scope modifications (S:C) imply the assault ripples past the susceptible element, affecting unrelated sources beneath totally different safety authorities.

Exploitation Dangers In Actual-World Eventualities

Attackers want solely low privileges and no person interplay, making this a low-complexity risk accessible by way of the community (AV:N, AC:L, PR:L, UI:N).

Whereas no public exploits exist but Microsoft deems exploitation “much less seemingly” the unproven maturity (E:U) doesn’t diminish the urgency.

Think about a company intranet the place an insider crafts a smuggling request to impersonate an admin, accessing payroll knowledge or injecting malware Or in e-commerce websites, the place smuggled requests may siphon buyer data throughout peak visitors.

The bug hits ASP.NET Core in .NET 8 and later variations, in addition to older .NET 2.3 setups utilizing the Kestrel server. Microsoft confirms no proof of lively exploitation, however the confirmed confidence (RC:C) and official repair (RL:O) underscore rapid motion.

Builders on .NET 8+ ought to apply the newest Microsoft Replace and restart purposes. For .NET 2.3, replace the Microsoft.AspNetCore.Server.Kestrel.Core package deal to model 2.3.6, recompile, and redeploy.

Self-contained apps require recompilation post-update. Broader remediation entails auditing HTTP parsing in customized middleware and enabling strict request validation.

This flaw revives issues over HTTP smuggling, a tactic seen in previous assaults on cloud companies. As distant work expands assault surfaces, organizations should prioritize patching.

Microsoft urges scanning for susceptible deployments and monitoring logs for anomalous requests. With the framework powering hundreds of thousands of internet apps, unpatched methods threat knowledge breaches or compliance violations.

Safety groups ought to combine this into vulnerability administration workflows, particularly given the framework’s position in enterprise stacks.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:ASP.NET, Attacker, Bypass, Critical, Feature, Remotely, Security, Vulnerability

Post navigation

Previous Post: Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers
Next Post: ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration

Related Posts

Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation Cyber Security News
New Wave of Crypto-Hijacking Infects 3,500+ Websites Cyber Security News
Android Photo Frames App Downloads Malware, Giving Hackers Control of The Device Without User Interaction Cyber Security News
Android 16 Comes with Advanced Device-level Security Setting Protection for 3 Billion Devices Cyber Security News
MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints Cyber Security News
HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LastPass Users Targeted With Backup-Themed Phishing Emails
  • AI Phishing Is Your Company’s Biggest Security Risk in 2026
  • Why Identity Security Must Move Beyond MFA
  • Multiple Vulnerabilities in Anthropic Git MCP server Enables Code Execution
  • How Smart MSSPs Using AI to Boost Margins with Half the Staff

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LastPass Users Targeted With Backup-Themed Phishing Emails
  • AI Phishing Is Your Company’s Biggest Security Risk in 2026
  • Why Identity Security Must Move Beyond MFA
  • Multiple Vulnerabilities in Anthropic Git MCP server Enables Code Execution
  • How Smart MSSPs Using AI to Boost Margins with Half the Staff

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark