Skip to main content

CVE-2024-21386: CWE-400: Uncontrolled Resource Consumption in Microsoft ASP.NET Core 6.0

High
VulnerabilityCVE-2024-21386cvecve-2024-21386cwe-400
Published: Tue Feb 13 2024 (02/13/2024, 18:02:20 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: ASP.NET Core 6.0

Description

.NET Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 08:06:26 UTC

Technical Analysis

CVE-2024-21386 is a high-severity vulnerability identified in Microsoft ASP.NET Core 6.0, classified under CWE-400: Uncontrolled Resource Consumption. This vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) condition by exploiting the way ASP.NET Core 6.0 handles certain requests, leading to excessive resource consumption. Specifically, the flaw can be triggered over the network (AV:N) without any privileges (PR:N) or user interaction (UI:N), making it relatively easy to exploit. The vulnerability does not impact confidentiality or integrity but severely affects availability by exhausting server resources, potentially causing the application or host to become unresponsive or crash. The CVSS 3.1 base score is 7.5, reflecting a high severity level. The exploitability is rated as 'Proof-of-Concept' (E:P), and the remediation level is official (RL:O) with confirmed reports (RC:C). No known exploits are currently observed in the wild, and no official patches have been linked yet. Given that ASP.NET Core 6.0 is widely used for building web applications and APIs, this vulnerability poses a significant risk to services relying on this framework, especially those exposed to the internet. Attackers can leverage this flaw to disrupt service availability, causing downtime and impacting business continuity.

Potential Impact

For European organizations, the impact of CVE-2024-21386 can be substantial, particularly for enterprises and public sector entities that rely on ASP.NET Core 6.0 for critical web applications and services. A successful DoS attack exploiting this vulnerability could lead to service outages, affecting customer-facing portals, internal applications, and APIs. This disruption can result in financial losses, reputational damage, and potential regulatory scrutiny under frameworks like GDPR if service availability impacts data processing or user access. Sectors such as finance, healthcare, government, and e-commerce, which often deploy ASP.NET Core-based solutions, may experience operational interruptions. Additionally, the ease of exploitation without authentication increases the risk of opportunistic attacks from external threat actors. The lack of current known exploits provides a window for proactive mitigation, but organizations must act swiftly to prevent potential exploitation as public awareness of the vulnerability grows.

Mitigation Recommendations

European organizations should implement the following specific mitigation strategies: 1) Monitor official Microsoft channels closely for the release of security patches addressing CVE-2024-21386 and prioritize timely deployment in all environments running ASP.NET Core 6.0. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block abnormal request patterns that could trigger resource exhaustion. 3) Implement rate limiting and request throttling at the application or network edge to reduce the risk of resource abuse. 4) Conduct thorough logging and monitoring of ASP.NET Core application performance metrics to identify early signs of resource strain. 5) Consider upgrading to later supported versions of ASP.NET Core if they are not affected by this vulnerability, after validating compatibility. 6) Isolate critical services behind network segmentation and use load balancers to distribute traffic and mitigate the impact of potential DoS attempts. 7) Educate development and operations teams about the vulnerability to ensure secure coding practices and rapid incident response. These measures, combined, will reduce the attack surface and improve resilience against exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:20.453Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeabd8

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 8:06:26 AM

Last updated: 8/12/2025, 9:12:56 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats