8.8

CVE-2025-21176

.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft.Net Version8.0.0 Update-
   ApplemacOS Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
MicrosoftVisual Studio 2017 Version >= 15.0 < 15.9.69
Microsoft.Net Framework Version4.6
   MicrosoftWindows 10 1507 Version-
Microsoft.Net Framework Version4.6.2
   MicrosoftWindows 10 1507 Version-
Microsoft.Net Framework Version4.6.2
   MicrosoftWindows Server 2008 Version- Updatesp2
Microsoft.Net Framework Version3.5
   MicrosoftWindows 10 21h2 Version-
   MicrosoftWindows 10 22h2 Version-
   MicrosoftWindows 11 22h2 Version-
   MicrosoftWindows 11 23h2 Version-
   MicrosoftWindows 11 24h2 Version-
   MicrosoftWindows Server 2022 Version-
   MicrosoftWindows Server 2022 23h2 Version-
Microsoft.Net Framework Version4.8.1
   MicrosoftWindows 10 21h2 Version-
   MicrosoftWindows 10 22h2 Version-
   MicrosoftWindows 11 22h2 Version-
   MicrosoftWindows 11 23h2 Version-
   MicrosoftWindows 11 24h2 Version-
   MicrosoftWindows Server 2022 Version-
   MicrosoftWindows Server 2022 23h2 Version-
Microsoft.Net Framework Version4.6.2
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
Microsoft.Net Framework Version4.7
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
Microsoft.Net Framework Version4.7.1
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
Microsoft.Net Framework Version4.7.2
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
Microsoft.Net Framework Version3.5
   MicrosoftWindows 10 1607 Version- HwPlatformx64
   MicrosoftWindows 10 1607 Version- HwPlatformx86
Microsoft.Net Framework Version4.6.2
   MicrosoftWindows 10 1607 Version- HwPlatformx64
   MicrosoftWindows 10 1607 Version- HwPlatformx86
Microsoft.Net Framework Version4.7
   MicrosoftWindows 10 1607 Version- HwPlatformx64
   MicrosoftWindows 10 1607 Version- HwPlatformx86
Microsoft.Net Framework Version4.7.1
   MicrosoftWindows 10 1607 Version- HwPlatformx64
   MicrosoftWindows 10 1607 Version- HwPlatformx86
Microsoft.Net Framework Version4.7.2
   MicrosoftWindows 10 1607 Version- HwPlatformx64
   MicrosoftWindows 10 1607 Version- HwPlatformx86
Microsoft.Net Framework Version3.5
   MicrosoftWindows 10 1809 Version- HwPlatformx64
   MicrosoftWindows 10 1809 Version- HwPlatformx86
   MicrosoftWindows 10 21h2 Version-
   MicrosoftWindows 10 22h2 Version-
   MicrosoftWindows Server 2016 Version-
   MicrosoftWindows Server 2019 Version-
   MicrosoftWindows Server 2022 Version-
Microsoft.Net Framework Version4.7.2
   MicrosoftWindows 10 1809 Version- HwPlatformx64
   MicrosoftWindows 10 1809 Version- HwPlatformx86
   MicrosoftWindows 10 21h2 Version-
   MicrosoftWindows 10 22h2 Version-
   MicrosoftWindows Server 2016 Version-
   MicrosoftWindows Server 2019 Version-
   MicrosoftWindows Server 2022 Version-
Microsoft.Net Framework Version4.8
   MicrosoftWindows 10 1607 Version- HwPlatformx64
   MicrosoftWindows 10 1607 Version- HwPlatformx86
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
   MicrosoftWindows Server 2016 Version-
Microsoft.Net Version9.0.0
   ApplemacOS Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.41% 0.803
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
secure@microsoft.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-126 Buffer Over-read

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.