⚠ Actively exploited
Added to CISA KEV on 2021-11-03. Federal agencies required to patch by 2022-05-03. Required action: Apply updates per vendor instructions..
Severity
9.8CRITICAL
EPSS
93.9%
top 0.13%
CISA KEV
KEV
Added 2021-11-03
Due 2022-05-03
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJan 14
KEV addedNov 3
KEV dueMay 3
Latest updateMay 24
CISA Required Action: Apply updates per vendor instructions.

Description

A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages49 packages

NVDmicrosoft/.net_framework11 versions+10
CVEListV5microsoft/microsoft_.net_framework_3.0Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2, Service Pack 2 on Windows Server 2008 for Itanium-Based Systems Service Pack 2, Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2+2
CVEListV5microsoft/microsoft_.net_framework_4.6Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2+1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-4w3v-83v8-mg94: A remote code execution vulnerability exists when the Microsoft2022-05-24
CVEList
CVE-2020-0646: A remote code execution vulnerability exists when the Microsoft2020-01-14
VulnCheck
Microsoft .NET Framework Remote Code Execution Vulnerability2020

💥Exploits & PoCs

2
Exploit-DB
SharePoint Workflows - XOML Injection (Metasploit)2020-03-31
Nuclei
Microsoft .NET Framework - Remote Code Execution

🔍Detection Rules

1
Suricata
ET EXPLOIT .NET Framework Remote Code Execution Injection (CVE-2020-0646)2021-11-18

📋Vendor Advisories

2
CISA
Microsoft .NET Framework Remote Code Execution Vulnerability2021-11-03
Microsoft
.NET Framework Remote Code Execution Injection Vulnerability2020-01-14