Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Warner Bros. Discovery shareholder vote weighs Paramount deal

    April 23, 2026

    Voya Financial shares rise on activist investor pressure for sale

    April 23, 2026

    Anthropic tested removing Claude Code from the Pro plan

    April 23, 2026
    Facebook X (Twitter) Instagram
    Addison Markets
    • Home
    • USA
    • Europe
    • Business
    • Investing
    • Tech
    • Politics
    • Contact Us
    Addison Markets
    Home»Tech»Microsoft issues emergency update for macOS and Linux ASP.NET threat
    Tech

    Microsoft issues emergency update for macOS and Linux ASP.NET threat

    franperez66q@protonmail.comBy franperez66q@protonmail.comApril 23, 2026No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email



    Microsoft released an emergency patch for its ASP.NET Core to fix a high-severity vulnerability that allows unauthenticated attackers to gain SYSTEM privileges on devices that use the Web development framework to run Linux or macOS apps.

    The software maker said Tuesday evening that the vulnerability, tracked as CVE-2026-40372, affects versions 10.0.0 through 10.0.6 of the Microsoft.AspNetCore.DataProtection NuGet, a package that’s part of the framework. The critical flaw stems from a faulty verification of cryptographic signatures. It can be exploited to allow unauthenticated attackers to forge authentication payloads during the HMAC validation process, which is used to verify the integrity and authenticity of data exchanged between a client and a server.

    Beware: Forged credentials survive patching

    During the time users ran a vulnerable version of the package, they were left open to an attack that would allow unauthenticated people to gain sensitive SYSTEM privileges that would allow full compromise of the underlying machine. Even after the vulnerability is patched, devices may still be compromised if authentication credentials created by a threat actor aren’t purged.

    “If an attacker used forged payloads to authenticate as a privileged user during the vulnerable window, they may have induced the application to issue legitimately-signed tokens (session refresh, API key, password reset link, etc.) to themselves,” Microsoft said. “Those tokens remain valid after upgrading to 10.0.7 unless the DataProtection key ring is rotated.”

    Microsoft describes ASP.NET Core as a “high-performance” web development framework for writing .Net apps that run on Windows, macOS, Linux, and Docker. The open-source package is “designed to allow runtime components, APIs, compilers, and languages [to] evolve quickly, while still providing a stable and supported platform to keep apps running.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    franperez66q@protonmail.com
    • Website

    Related Posts

    Anthropic tested removing Claude Code from the Pro plan

    April 23, 2026

    5 things to know before the market opens Thursday

    April 23, 2026

    Jim Cramer’s strategy to avoid missing out on big winners

    April 23, 2026

    You want your Moon landings in HD? So does NASA—here’s how it’s happening.

    April 23, 2026

    Microsoft expands AI footprint in Australia with $18 billion investment

    April 23, 2026

    RFK Jr. won’t back CDC director on vaccines as agency scraps positive data

    April 23, 2026
    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Warner Bros. Discovery shareholder vote weighs Paramount deal

    April 23, 2026

    Voya Financial shares rise on activist investor pressure for sale

    April 23, 2026

    Anthropic tested removing Claude Code from the Pro plan

    April 23, 2026

    Trump: Navy to shoot and kill any boat laying mines in Hormuz Strait

    April 23, 2026
    © 2026 All right reserved
    • About Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.