CVE-2024-21386: CWE-400: Uncontrolled Resource Consumption in Microsoft ASP.NET Core 6.0
.NET Denial of Service Vulnerability
AI Analysis
Technical Summary
CVE-2024-21386 is a high-severity vulnerability identified in Microsoft ASP.NET Core 6.0, classified under CWE-400: Uncontrolled Resource Consumption. This vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) condition by exploiting the way ASP.NET Core 6.0 handles certain requests, leading to excessive resource consumption. Specifically, the flaw can be triggered over the network (AV:N) without any privileges (PR:N) or user interaction (UI:N), making it relatively easy to exploit. The vulnerability does not impact confidentiality or integrity but severely affects availability by exhausting server resources, potentially causing the application or host to become unresponsive or crash. The CVSS 3.1 base score is 7.5, reflecting a high severity level. The exploitability is rated as 'Proof-of-Concept' (E:P), and the remediation level is official (RL:O) with confirmed reports (RC:C). No known exploits are currently observed in the wild, and no official patches have been linked yet. Given that ASP.NET Core 6.0 is widely used for building web applications and APIs, this vulnerability poses a significant risk to services relying on this framework, especially those exposed to the internet. Attackers can leverage this flaw to disrupt service availability, causing downtime and impacting business continuity.
Potential Impact
For European organizations, the impact of CVE-2024-21386 can be substantial, particularly for enterprises and public sector entities that rely on ASP.NET Core 6.0 for critical web applications and services. A successful DoS attack exploiting this vulnerability could lead to service outages, affecting customer-facing portals, internal applications, and APIs. This disruption can result in financial losses, reputational damage, and potential regulatory scrutiny under frameworks like GDPR if service availability impacts data processing or user access. Sectors such as finance, healthcare, government, and e-commerce, which often deploy ASP.NET Core-based solutions, may experience operational interruptions. Additionally, the ease of exploitation without authentication increases the risk of opportunistic attacks from external threat actors. The lack of current known exploits provides a window for proactive mitigation, but organizations must act swiftly to prevent potential exploitation as public awareness of the vulnerability grows.
Mitigation Recommendations
European organizations should implement the following specific mitigation strategies: 1) Monitor official Microsoft channels closely for the release of security patches addressing CVE-2024-21386 and prioritize timely deployment in all environments running ASP.NET Core 6.0. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block abnormal request patterns that could trigger resource exhaustion. 3) Implement rate limiting and request throttling at the application or network edge to reduce the risk of resource abuse. 4) Conduct thorough logging and monitoring of ASP.NET Core application performance metrics to identify early signs of resource strain. 5) Consider upgrading to later supported versions of ASP.NET Core if they are not affected by this vulnerability, after validating compatibility. 6) Isolate critical services behind network segmentation and use load balancers to distribute traffic and mitigate the impact of potential DoS attempts. 7) Educate development and operations teams about the vulnerability to ensure secure coding practices and rapid incident response. These measures, combined, will reduce the attack surface and improve resilience against exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Ireland
CVE-2024-21386: CWE-400: Uncontrolled Resource Consumption in Microsoft ASP.NET Core 6.0
Description
.NET Denial of Service Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-21386 is a high-severity vulnerability identified in Microsoft ASP.NET Core 6.0, classified under CWE-400: Uncontrolled Resource Consumption. This vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) condition by exploiting the way ASP.NET Core 6.0 handles certain requests, leading to excessive resource consumption. Specifically, the flaw can be triggered over the network (AV:N) without any privileges (PR:N) or user interaction (UI:N), making it relatively easy to exploit. The vulnerability does not impact confidentiality or integrity but severely affects availability by exhausting server resources, potentially causing the application or host to become unresponsive or crash. The CVSS 3.1 base score is 7.5, reflecting a high severity level. The exploitability is rated as 'Proof-of-Concept' (E:P), and the remediation level is official (RL:O) with confirmed reports (RC:C). No known exploits are currently observed in the wild, and no official patches have been linked yet. Given that ASP.NET Core 6.0 is widely used for building web applications and APIs, this vulnerability poses a significant risk to services relying on this framework, especially those exposed to the internet. Attackers can leverage this flaw to disrupt service availability, causing downtime and impacting business continuity.
Potential Impact
For European organizations, the impact of CVE-2024-21386 can be substantial, particularly for enterprises and public sector entities that rely on ASP.NET Core 6.0 for critical web applications and services. A successful DoS attack exploiting this vulnerability could lead to service outages, affecting customer-facing portals, internal applications, and APIs. This disruption can result in financial losses, reputational damage, and potential regulatory scrutiny under frameworks like GDPR if service availability impacts data processing or user access. Sectors such as finance, healthcare, government, and e-commerce, which often deploy ASP.NET Core-based solutions, may experience operational interruptions. Additionally, the ease of exploitation without authentication increases the risk of opportunistic attacks from external threat actors. The lack of current known exploits provides a window for proactive mitigation, but organizations must act swiftly to prevent potential exploitation as public awareness of the vulnerability grows.
Mitigation Recommendations
European organizations should implement the following specific mitigation strategies: 1) Monitor official Microsoft channels closely for the release of security patches addressing CVE-2024-21386 and prioritize timely deployment in all environments running ASP.NET Core 6.0. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block abnormal request patterns that could trigger resource exhaustion. 3) Implement rate limiting and request throttling at the application or network edge to reduce the risk of resource abuse. 4) Conduct thorough logging and monitoring of ASP.NET Core application performance metrics to identify early signs of resource strain. 5) Consider upgrading to later supported versions of ASP.NET Core if they are not affected by this vulnerability, after validating compatibility. 6) Isolate critical services behind network segmentation and use load balancers to distribute traffic and mitigate the impact of potential DoS attempts. 7) Educate development and operations teams about the vulnerability to ensure secure coding practices and rapid incident response. These measures, combined, will reduce the attack surface and improve resilience against exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2023-12-08T22:45:20.453Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9836c4522896dcbeabd8
Added to database: 5/21/2025, 9:09:10 AM
Last enriched: 6/26/2025, 8:06:26 AM
Last updated: 8/12/2025, 9:12:56 PM
Views: 18
Related Threats
CVE-2025-8064: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in aicwebtech Bible SuperSearch
MediumCVE-2025-8895: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in cozmoslabs WP Webhooks – Automate repetitive tasks by creating powerful automation workflows directly within WordPress
CriticalCVE-2025-7390: CWE-295 Improper Certificate Validation in Softing Industrial Automation GmbH OPC UA C++ SDK
CriticalCVE-2025-53505: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Intermesh BV Group-Office
MediumCVE-2025-53504: Cross-site scripting (XSS) in Intermesh BV Group-Office
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.