8.8

CVE-2025-21176

.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft.Net Version8.0.0 Update-
   ApplemacOS Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
MicrosoftVisual Studio 2017 Version >= 15.0 < 15.9.69
Microsoft.Net Framework Version4.6
   MicrosoftWindows 10 1507 Version-
Microsoft.Net Framework Version4.6.2
   MicrosoftWindows 10 1507 Version-
Microsoft.Net Framework Version4.6.2
   MicrosoftWindows Server 2008 Version- Updatesp2
Microsoft.Net Framework Version3.5
   MicrosoftWindows 10 21h2 Version-
   MicrosoftWindows 10 22h2 Version-
   MicrosoftWindows 11 22h2 Version-
   MicrosoftWindows 11 23h2 Version-
   MicrosoftWindows 11 24h2 Version-
   MicrosoftWindows Server 2022 Version-
   MicrosoftWindows Server 2022 23h2 Version-
Microsoft.Net Framework Version4.8.1
   MicrosoftWindows 10 21h2 Version-
   MicrosoftWindows 10 22h2 Version-
   MicrosoftWindows 11 22h2 Version-
   MicrosoftWindows 11 23h2 Version-
   MicrosoftWindows 11 24h2 Version-
   MicrosoftWindows Server 2022 Version-
   MicrosoftWindows Server 2022 23h2 Version-
Microsoft.Net Framework Version4.6.2
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
Microsoft.Net Framework Version4.7
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
Microsoft.Net Framework Version4.7.1
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
Microsoft.Net Framework Version4.7.2
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
Microsoft.Net Framework Version3.5
   MicrosoftWindows 10 1607 Version- HwPlatformx64
   MicrosoftWindows 10 1607 Version- HwPlatformx86
Microsoft.Net Framework Version4.6.2
   MicrosoftWindows 10 1607 Version- HwPlatformx64
   MicrosoftWindows 10 1607 Version- HwPlatformx86
Microsoft.Net Framework Version4.7
   MicrosoftWindows 10 1607 Version- HwPlatformx64
   MicrosoftWindows 10 1607 Version- HwPlatformx86
Microsoft.Net Framework Version4.7.1
   MicrosoftWindows 10 1607 Version- HwPlatformx64
   MicrosoftWindows 10 1607 Version- HwPlatformx86
Microsoft.Net Framework Version4.7.2
   MicrosoftWindows 10 1607 Version- HwPlatformx64
   MicrosoftWindows 10 1607 Version- HwPlatformx86
Microsoft.Net Framework Version3.5
   MicrosoftWindows 10 1809 Version- HwPlatformx64
   MicrosoftWindows 10 1809 Version- HwPlatformx86
   MicrosoftWindows 10 21h2 Version-
   MicrosoftWindows 10 22h2 Version-
   MicrosoftWindows Server 2016 Version-
   MicrosoftWindows Server 2019 Version-
   MicrosoftWindows Server 2022 Version-
Microsoft.Net Framework Version4.7.2
   MicrosoftWindows 10 1809 Version- HwPlatformx64
   MicrosoftWindows 10 1809 Version- HwPlatformx86
   MicrosoftWindows 10 21h2 Version-
   MicrosoftWindows 10 22h2 Version-
   MicrosoftWindows Server 2016 Version-
   MicrosoftWindows Server 2019 Version-
   MicrosoftWindows Server 2022 Version-
Microsoft.Net Framework Version4.8
   MicrosoftWindows 10 1607 Version- HwPlatformx64
   MicrosoftWindows 10 1607 Version- HwPlatformx86
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
   MicrosoftWindows Server 2016 Version-
Microsoft.Net Version9.0.0
   ApplemacOS Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.91% 0.752
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
secure@microsoft.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-126 Buffer Over-read

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.