CVE-2025-36854: CWE-416: Use After Free in Microsoft .NET 6.0
A vulnerability ( CVE-2024-38229 https://www.cve.org/CVERecord ) exists in EOL ASP.NET when closing an HTTP/3 stream while application code is writing to the response body, a race condition may lead to use-after-free, resulting in Remote Code Execution. Per CWE-416: Use After Free https://cwe.mitre.org/data/definitions/416.html , Use After Free is when a product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. This issue affects EOL ASP.NET 6.0.0 <= 6.0.36 as represented in this CVE, as well as 8.0.0 <= 8.0.8, 9.0.0-preview.1.24081.5 <= 9.0.0.RC.1 as represented in CVE-2024-38229 https://www.cve.org/CVERecord . Additionally, if you've deployed self-contained applications https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. NOTE: This CVE only represents End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
AI Analysis
Technical Summary
CVE-2025-36854 is a high-severity use-after-free vulnerability (CWE-416) affecting Microsoft .NET 6.0, specifically impacting End Of Life (EOL) ASP.NET versions 6.0.0 through 6.0.36. The vulnerability arises from a race condition when closing an HTTP/3 stream while application code is concurrently writing to the response body. This race condition can cause the application to reference memory that has already been freed, leading to undefined behavior. Exploitation of this flaw can result in remote code execution (RCE), allowing an attacker to execute arbitrary code on the affected system without authentication or user interaction. The vulnerability also affects self-contained .NET applications targeting these impacted versions, which must be recompiled and redeployed to mitigate risk. Notably, Microsoft has declared these versions as EOL and will not provide security updates or support, increasing the risk for organizations continuing to use these versions. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector but requiring high attack complexity. No known exploits are currently in the wild, but the potential for severe impact exists given the nature of RCE and the widespread use of .NET in enterprise environments.
Potential Impact
For European organizations, the impact of CVE-2025-36854 is significant due to the widespread adoption of Microsoft .NET technologies in enterprise web applications and services. Exploitation could lead to full system compromise, data breaches, service disruption, and lateral movement within corporate networks. Critical infrastructure, financial institutions, healthcare providers, and government agencies relying on ASP.NET 6.0 EOL versions are particularly at risk. The lack of vendor support and patches for these EOL versions means organizations must rely on internal mitigations or upgrade paths, increasing operational risk. Additionally, self-contained .NET applications deployed in production environments may unknowingly remain vulnerable if not recompiled and redeployed, exposing sensitive data and critical systems to attackers. The vulnerability’s ability to cause remote code execution without authentication or user interaction elevates the threat level, potentially enabling attackers to bypass perimeter defenses and execute sophisticated attacks against European enterprises.
Mitigation Recommendations
Given the EOL status of the affected ASP.NET versions, the primary mitigation is to upgrade to a supported .NET version that addresses this vulnerability. Organizations should prioritize migrating applications from .NET 6.0 EOL versions to the latest supported releases (e.g., .NET 7 or later) that receive security updates. For self-contained applications, recompilation and redeployment targeting secure versions are essential. In environments where immediate upgrade is not feasible, organizations should implement strict network segmentation and firewall rules to limit exposure of vulnerable services, especially those using HTTP/3. Employ runtime application self-protection (RASP) and web application firewalls (WAF) with custom rules to detect and block suspicious HTTP/3 stream closure patterns. Conduct thorough code reviews and testing to identify and eliminate unsafe memory handling patterns in custom ASP.NET code. Monitor logs and network traffic for anomalous behavior indicative of exploitation attempts. Finally, establish an incident response plan tailored to potential RCE attacks exploiting this vulnerability to minimize damage if an incident occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Ireland
CVE-2025-36854: CWE-416: Use After Free in Microsoft .NET 6.0
Description
A vulnerability ( CVE-2024-38229 https://www.cve.org/CVERecord ) exists in EOL ASP.NET when closing an HTTP/3 stream while application code is writing to the response body, a race condition may lead to use-after-free, resulting in Remote Code Execution. Per CWE-416: Use After Free https://cwe.mitre.org/data/definitions/416.html , Use After Free is when a product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. This issue affects EOL ASP.NET 6.0.0 <= 6.0.36 as represented in this CVE, as well as 8.0.0 <= 8.0.8, 9.0.0-preview.1.24081.5 <= 9.0.0.RC.1 as represented in CVE-2024-38229 https://www.cve.org/CVERecord . Additionally, if you've deployed self-contained applications https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. NOTE: This CVE only represents End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
AI-Powered Analysis
Technical Analysis
CVE-2025-36854 is a high-severity use-after-free vulnerability (CWE-416) affecting Microsoft .NET 6.0, specifically impacting End Of Life (EOL) ASP.NET versions 6.0.0 through 6.0.36. The vulnerability arises from a race condition when closing an HTTP/3 stream while application code is concurrently writing to the response body. This race condition can cause the application to reference memory that has already been freed, leading to undefined behavior. Exploitation of this flaw can result in remote code execution (RCE), allowing an attacker to execute arbitrary code on the affected system without authentication or user interaction. The vulnerability also affects self-contained .NET applications targeting these impacted versions, which must be recompiled and redeployed to mitigate risk. Notably, Microsoft has declared these versions as EOL and will not provide security updates or support, increasing the risk for organizations continuing to use these versions. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector but requiring high attack complexity. No known exploits are currently in the wild, but the potential for severe impact exists given the nature of RCE and the widespread use of .NET in enterprise environments.
Potential Impact
For European organizations, the impact of CVE-2025-36854 is significant due to the widespread adoption of Microsoft .NET technologies in enterprise web applications and services. Exploitation could lead to full system compromise, data breaches, service disruption, and lateral movement within corporate networks. Critical infrastructure, financial institutions, healthcare providers, and government agencies relying on ASP.NET 6.0 EOL versions are particularly at risk. The lack of vendor support and patches for these EOL versions means organizations must rely on internal mitigations or upgrade paths, increasing operational risk. Additionally, self-contained .NET applications deployed in production environments may unknowingly remain vulnerable if not recompiled and redeployed, exposing sensitive data and critical systems to attackers. The vulnerability’s ability to cause remote code execution without authentication or user interaction elevates the threat level, potentially enabling attackers to bypass perimeter defenses and execute sophisticated attacks against European enterprises.
Mitigation Recommendations
Given the EOL status of the affected ASP.NET versions, the primary mitigation is to upgrade to a supported .NET version that addresses this vulnerability. Organizations should prioritize migrating applications from .NET 6.0 EOL versions to the latest supported releases (e.g., .NET 7 or later) that receive security updates. For self-contained applications, recompilation and redeployment targeting secure versions are essential. In environments where immediate upgrade is not feasible, organizations should implement strict network segmentation and firewall rules to limit exposure of vulnerable services, especially those using HTTP/3. Employ runtime application self-protection (RASP) and web application firewalls (WAF) with custom rules to detect and block suspicious HTTP/3 stream closure patterns. Conduct thorough code reviews and testing to identify and eliminate unsafe memory handling patterns in custom ASP.NET code. Monitor logs and network traffic for anomalous behavior indicative of exploitation attempts. Finally, establish an incident response plan tailored to potential RCE attacks exploiting this vulnerability to minimize damage if an incident occurs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- HeroDevs
- Date Reserved
- 2025-04-15T23:50:31.198Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bee1dfd5a2966cfc801501
Added to database: 9/8/2025, 2:02:07 PM
Last enriched: 9/8/2025, 2:16:36 PM
Last updated: 9/9/2025, 8:06:04 AM
Views: 13
Related Threats
CVE-2025-10095: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Proximus sp. z o.o. SMSEagle
MediumCVE-2025-48208: CWE-90 Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') in Apache Software Foundation Apache HertzBeat (incubating)
HighCVE-2025-24404: CWE-91 XML Injection (aka Blind XPath Injection) in Apache Software Foundation Apache HertzBeat (incubating)
HighCVE-2025-59019: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in TYPO3 TYPO3 CMS
MediumCVE-2025-59018: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in TYPO3 TYPO3 CMS
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.