Critical .NET Security Alert: CVE-2025-24070 Impacts .NET 6

Critical .NET Security Alert: CVE-2025-24070 Impacts .NET 6


Executive Summary

 

Our security research team has identified that the recently disclosed vulnerability CVE-2025-24070, an elevation of privilege vulnerability in ASP.NET Core, also affects .NET 6 applications despite not being mentioned in Microsoft’s official security advisory. As part of our Endless Lifecycle Support (ELS) program for .NET 6, which delivers long-term end-of-life patches, we have analyzed this vulnerability thoroughly and developed a patch that addresses this issue for our customers still operating on this platform.

Understanding the Vulnerability

 

CVE-2025-24070 is classified as a high-severity vulnerability (CVSS v3 score: 7.0) that exists in ASP.NET Core applications. The vulnerability centers around the RefreshSignInAsync method, which could allow an attacker to impersonate another user’s account, resulting in unauthorized elevation of privileges.

Specifically, this vulnerability allows an attacker to call RefreshSignInAsync and pass a different user parameter than the one currently authenticated, with ASP.NET Core accepting this request. This security flaw presents potential for remote exploitation and could lead to significant security breaches in affected applications.

Affected Versions

 

Microsoft’s advisory explicitly mentions ASP.NET Core 9.0, ASP.NET Core 8.0, and ASP.NET Core 2.3 as the affected versions, since those are the versions currently being officially supported by them. Our investigation confirms that .NET 6 applications are similarly vulnerable. 

Officially documented affected versions include:

  • ASP.NET Core 9.0.2 and earlier
  • ASP.NET Core 8.0.13 and earlier
  • ASP.NET Core 2.3.0 and earlier

Our addition: .NET 6 applications using the ASP.NET Core Identity components

Technical Details

 

The vulnerability exists in ASP.NET Core’s authentication mechanism, specifically within the SignInManager class when handling the RefreshSignInAsync method. The vulnerability allows the RefreshSignInAsync method to accept a user parameter that does not match the currently authenticated user.

Under normal circumstances, refreshing a sign-in should only work for the currently authenticated user. However, due to insufficient validation, an attacker could:

  1. Obtain a valid authentication session
  2. Call RefreshSignInAsync with parameters for a different user account
  3. Successfully elevate their privileges to that of the specified account

The patch implemented by Microsoft for supported versions modifies the RefreshSignInAsync method to validate that the user ID of the supplied user parameter matches the user ID of the currently authenticated user. If they don’t match, the operation fails silently (in patch versions) or throws an exception (in newer versions).

Our Solution for .NET 6 Users

 

As part of our commitment to providing Endless Lifecycle Support for .NET 6, we have:

  1. Developed a security patch that brings the same protection to .NET 6 applications
  2. Thoroughly tested this patch to ensure both security and compatibility
  3. Made it available immediately to all our customers on our support plan

Our patch implements the same security checks that Microsoft has added to supported versions, ensuring that RefreshSignInAsync can only refresh the sign-in for the currently authenticated user.

Recommended Actions

 

If you are running .NET 6 applications, we strongly recommend taking the following actions:

  1. Apply our security patch immediately to protect against potential exploitation
  2. Audit your application’s authentication code, particularly any custom implementations involving RefreshSignInAsync
  3. Implement proper logging to detect potential exploitation attempts

How to Obtain the Fix

 

Customers enrolled in our Endless Lifecycle Support program can download the security patch from our repository. The update can be applied with minimal downtime and does not require application code changes.

Not currently a customer? You can learn more about our Endless Lifecycle Support for legacy .NET here.

Final Thoughts

 

This discovery underscores the importance of extended support for frameworks that have reached end of life from their vendors but remain in widespread use. Our security research team remains vigilant in identifying vulnerabilities that affect all versions of .NET, regardless of their official support status.

By providing security patches for .NET 6, we help organizations maintain secure operations while planning their migration strategy at a pace that makes business sense.

CVE-2025-24070 | CVSS v3 Score: 7.0 (High) | March 25, 2025

 

Summary

Article Name

Critical .NET Security Alert: CVE-2025-24070 Impacts .NET 6

Description

Our security research team has identified that the recently disclosed vulnerability CVE-2025-24070 . Read more about this topic here

Author

Joao Correia

Publisher Name

TuxCare

Publisher Logo



💸 Affordable Cloud Servers in Argentina! 🚀

At Full Tech Solutions, we offer Affordable Cloud Servers with high performance and advanced security, perfect for entrepreneurs, businesses, and developers looking for power at a budget-friendly price.

💰 Competitive Pricing: Power and flexibility without breaking the bank.
High Performance: Speed and stability for your applications.
🔒 Advanced Security: Protect your data with cutting-edge technology.
📞 24/7 Support: Our experts are ready to assist you anytime.

Don’t compromise quality for cost. Choose Full Tech Solutions and get the best affordable cloud servers in Argentina.

🌐 Scale your project with performance and savings!

Source Link

Write a Comment

Leave a Comment

Your email address will not be published. Required fields are marked *