Skip to main content

CVE-2025-36853: CWE-190: Integer Overflow or Wraparound in Microsoft .NET 6.0

High
VulnerabilityCVE-2025-36853cvecve-2025-36853cwe-190cwe-122
Published: Mon Sep 08 2025 (09/08/2025, 13:48:43 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: .NET 6.0

Description

A vulnerability (CVE-2025-21172) exists in msdia140.dll due to integer overflow and heap-based overflow. Per CWE-122: Heap-based Buffer Overflow, a heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().‍ Per CWE-190: Integer Overflow or Wraparound, is when a product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number. NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.

AI-Powered Analysis

AILast updated: 09/08/2025, 14:16:24 UTC

Technical Analysis

CVE-2025-36853 is a high-severity vulnerability affecting Microsoft .NET 6.0, specifically version 6.0.0, involving an integer overflow and a subsequent heap-based buffer overflow in the msdia140.dll component. The integer overflow (CWE-190) occurs when the software performs a calculation that exceeds the maximum value storable in an integer variable, causing the value to wrap around to a smaller or negative number. This miscalculation can lead to improper memory allocation or indexing. The heap-based buffer overflow (CWE-122) arises when the program writes more data to a heap-allocated buffer than it can hold, potentially overwriting adjacent memory. This combination can allow an attacker to corrupt memory, leading to arbitrary code execution, privilege escalation, or denial of service. The vulnerability requires network attack vector (AV:N), high attack complexity (AC:H), no privileges (PR:N), and user interaction (UI:R), with an unchanged scope (S:U). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Notably, this vulnerability affects only an End Of Life (EOL) software component, and Microsoft has confirmed no plans to provide patches or support. No known exploits are currently observed in the wild. The lack of patch availability increases the risk for organizations continuing to use this version of .NET 6.0.0, as attackers could develop exploits targeting this flaw, especially in environments where user interaction can be induced.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on legacy .NET 6.0.0 applications or components that include msdia140.dll. Exploitation could lead to unauthorized code execution, data breaches, or service disruptions, affecting business continuity and data confidentiality. Sectors such as finance, healthcare, and critical infrastructure, which often use .NET frameworks for internal and external applications, may face increased risks. The requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the attack surface. The absence of vendor support and patches means organizations must rely on mitigations or upgrades, complicating incident response and increasing exposure time. Additionally, compliance with European data protection regulations (e.g., GDPR) could be jeopardized if this vulnerability leads to data leaks or service outages.

Mitigation Recommendations

Given the lack of official patches, European organizations should prioritize upgrading to supported versions of the .NET framework that have addressed this vulnerability. If immediate upgrade is not feasible, organizations should implement strict application whitelisting and sandboxing to limit the execution of vulnerable components. Network-level controls should be enhanced to detect and block suspicious activities, especially those involving user interaction vectors such as phishing emails or malicious web content. Employing endpoint detection and response (EDR) solutions with behavioral analysis can help identify exploitation attempts. Regular code audits and static analysis on applications using msdia140.dll may uncover risky usage patterns. Additionally, organizations should enforce strict user training programs to reduce the likelihood of successful social engineering attacks. Monitoring for unusual heap memory usage or crashes in affected applications can provide early warning signs. Finally, isolating legacy systems and restricting their network access can reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
HeroDevs
Date Reserved
2025-04-15T23:50:31.198Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bee1dfd5a2966cfc801505

Added to database: 9/8/2025, 2:02:07 PM

Last enriched: 9/8/2025, 2:16:24 PM

Last updated: 9/9/2025, 7:16:09 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats