Skip to main content

CVE-2024-20672: CWE-400: Uncontrolled Resource Consumption in Microsoft .NET 6.0

High
VulnerabilityCVE-2024-20672cvecve-2024-20672cwe-400
Published: Tue Jan 09 2024 (01/09/2024, 17:56:58 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: .NET 6.0

Description

.NET Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 07/06/2025, 00:39:49 UTC

Technical Analysis

CVE-2024-20672 is a high-severity vulnerability classified under CWE-400, which pertains to uncontrolled resource consumption, commonly known as a Denial of Service (DoS) vulnerability. This issue affects Microsoft .NET 6.0, specifically version 6.0.0. The vulnerability allows an unauthenticated attacker to remotely trigger excessive resource consumption without requiring user interaction, potentially leading to service disruption or system unavailability. The CVSS 3.1 base score of 7.5 reflects a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity impact. The exploitability is partially confirmed (E:P), and the report confidence is confirmed (RC:C). Although no known exploits are currently reported in the wild, the vulnerability's characteristics suggest it could be weaponized to degrade or crash services running on .NET 6.0. The lack of available patches at the time of publication increases the urgency for mitigation. This vulnerability is particularly critical for applications and services relying on .NET 6.0, as uncontrolled resource consumption can lead to denial of service, affecting business continuity and user experience.

Potential Impact

For European organizations, the impact of CVE-2024-20672 can be significant, especially for those heavily reliant on Microsoft .NET 6.0 for critical business applications, web services, and cloud infrastructure. A successful exploitation could lead to service outages, degraded performance, and potential downtime, affecting operational continuity and customer trust. Industries such as finance, healthcare, government, and telecommunications, which often use .NET technologies for backend services, could face disruptions that might also have regulatory and compliance implications under frameworks like GDPR. Additionally, the unavailability of services could impact e-commerce platforms and public-facing portals, leading to financial losses and reputational damage. Given the network-based attack vector and no requirement for authentication or user interaction, attackers could remotely target vulnerable systems at scale, increasing the risk of widespread disruption across European enterprises.

Mitigation Recommendations

To mitigate CVE-2024-20672, European organizations should: 1) Immediately assess their environment to identify all instances running .NET 6.0.0 and prioritize those exposed to external networks. 2) Monitor official Microsoft channels for patches or security updates addressing this vulnerability and apply them promptly once available. 3) Implement network-level protections such as rate limiting, web application firewalls (WAFs), and intrusion detection/prevention systems (IDS/IPS) to detect and block abnormal traffic patterns indicative of resource exhaustion attacks. 4) Employ resource quotas and limits within hosting environments (e.g., containers, cloud services) to prevent a single process from consuming excessive resources. 5) Conduct thorough logging and monitoring to detect early signs of resource consumption anomalies. 6) Consider upgrading to later, patched versions of .NET if feasible, to benefit from built-in fixes and improvements. 7) Engage in proactive incident response planning to quickly isolate and remediate affected systems in case of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-11-28T22:58:12.117Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbea8c1

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 7/6/2025, 12:39:49 AM

Last updated: 8/29/2025, 10:53:19 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats