CVE-2025-36855: CWE-126: Buffer Over-read in Microsoft .NET 6.0
A vulnerability ( CVE-2025-21176 https://www.cve.org/CVERecord ) exists in DiaSymReader.dll due to buffer over-read. Per CWE-126: Buffer Over-read https://cwe.mitre.org/data/definitions/126.html , Buffer Over-read is when a product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. This issue affects EOL ASP.NET 6.0.0 <= 6.0.36 as represented in this CVE, as well as 8.0.0 <= 8.0.11 & <= 9.0.0 as represented in CVE-2025-21176. Additionally, if you've deployed self-contained applications https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
AI Analysis
Technical Summary
CVE-2025-36855 is a high-severity buffer over-read vulnerability (CWE-126) affecting Microsoft .NET 6.0, specifically the DiaSymReader.dll component. Buffer over-read occurs when a program reads data beyond the allocated buffer boundaries, potentially exposing sensitive information or causing application crashes. This vulnerability impacts .NET 6.0 versions from 6.0.0 up to 6.0.36, which are now End of Life (EOL) and no longer supported by Microsoft. The issue also affects self-contained .NET applications compiled with these versions, requiring recompilation and redeployment to mitigate. The vulnerability has a CVSS 3.1 score of 8.8, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact scope is unchanged (S:U), with high confidentiality, integrity, and availability impacts (C:H/I:H/A:H). Exploitation could lead to unauthorized disclosure of memory contents, data corruption, or denial of service. No patches are available due to the EOL status, and no known exploits are currently in the wild. Organizations using .NET 6.0 in production, especially those deploying self-contained applications, are at risk if they continue to run these vulnerable versions without mitigation.
Potential Impact
European organizations relying on .NET 6.0 for critical applications face significant risks from this vulnerability. The buffer over-read could expose sensitive data processed by applications, leading to confidentiality breaches. Integrity and availability impacts could disrupt business operations, causing data corruption or application crashes. Since .NET 6.0 is widely used in enterprise environments across Europe for web services, cloud applications, and internal tools, the threat surface is substantial. The lack of vendor support and patches for EOL versions exacerbates the risk, forcing organizations to either upgrade or implement compensating controls. Industries such as finance, healthcare, and government, which handle sensitive personal and financial data, are particularly vulnerable. Additionally, self-contained deployments, common in cloud and containerized environments, require special attention as they embed the vulnerable runtime. The requirement for user interaction to exploit the vulnerability may limit automated attacks but does not eliminate risk, especially in phishing or social engineering scenarios targeting European users.
Mitigation Recommendations
Given the absence of official patches, European organizations should prioritize upgrading to supported .NET versions (e.g., .NET 7 or later) that do not contain this vulnerability. For self-contained applications, recompilation with updated runtimes is essential. Where immediate upgrade is not feasible, organizations should implement strict network segmentation and application whitelisting to limit exposure. Employ runtime application self-protection (RASP) and enhanced monitoring to detect anomalous memory access patterns or crashes indicative of exploitation attempts. Educate users to recognize and avoid phishing or social engineering tactics that could trigger the required user interaction. Additionally, conduct thorough code reviews and security testing of applications using DiaSymReader.dll to identify and mitigate potential exploitation vectors. Finally, maintain robust incident response plans tailored to memory corruption vulnerabilities to quickly contain and remediate any incidents.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Belgium, Italy, Spain
CVE-2025-36855: CWE-126: Buffer Over-read in Microsoft .NET 6.0
Description
A vulnerability ( CVE-2025-21176 https://www.cve.org/CVERecord ) exists in DiaSymReader.dll due to buffer over-read. Per CWE-126: Buffer Over-read https://cwe.mitre.org/data/definitions/126.html , Buffer Over-read is when a product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. This issue affects EOL ASP.NET 6.0.0 <= 6.0.36 as represented in this CVE, as well as 8.0.0 <= 8.0.11 & <= 9.0.0 as represented in CVE-2025-21176. Additionally, if you've deployed self-contained applications https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
AI-Powered Analysis
Technical Analysis
CVE-2025-36855 is a high-severity buffer over-read vulnerability (CWE-126) affecting Microsoft .NET 6.0, specifically the DiaSymReader.dll component. Buffer over-read occurs when a program reads data beyond the allocated buffer boundaries, potentially exposing sensitive information or causing application crashes. This vulnerability impacts .NET 6.0 versions from 6.0.0 up to 6.0.36, which are now End of Life (EOL) and no longer supported by Microsoft. The issue also affects self-contained .NET applications compiled with these versions, requiring recompilation and redeployment to mitigate. The vulnerability has a CVSS 3.1 score of 8.8, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact scope is unchanged (S:U), with high confidentiality, integrity, and availability impacts (C:H/I:H/A:H). Exploitation could lead to unauthorized disclosure of memory contents, data corruption, or denial of service. No patches are available due to the EOL status, and no known exploits are currently in the wild. Organizations using .NET 6.0 in production, especially those deploying self-contained applications, are at risk if they continue to run these vulnerable versions without mitigation.
Potential Impact
European organizations relying on .NET 6.0 for critical applications face significant risks from this vulnerability. The buffer over-read could expose sensitive data processed by applications, leading to confidentiality breaches. Integrity and availability impacts could disrupt business operations, causing data corruption or application crashes. Since .NET 6.0 is widely used in enterprise environments across Europe for web services, cloud applications, and internal tools, the threat surface is substantial. The lack of vendor support and patches for EOL versions exacerbates the risk, forcing organizations to either upgrade or implement compensating controls. Industries such as finance, healthcare, and government, which handle sensitive personal and financial data, are particularly vulnerable. Additionally, self-contained deployments, common in cloud and containerized environments, require special attention as they embed the vulnerable runtime. The requirement for user interaction to exploit the vulnerability may limit automated attacks but does not eliminate risk, especially in phishing or social engineering scenarios targeting European users.
Mitigation Recommendations
Given the absence of official patches, European organizations should prioritize upgrading to supported .NET versions (e.g., .NET 7 or later) that do not contain this vulnerability. For self-contained applications, recompilation with updated runtimes is essential. Where immediate upgrade is not feasible, organizations should implement strict network segmentation and application whitelisting to limit exposure. Employ runtime application self-protection (RASP) and enhanced monitoring to detect anomalous memory access patterns or crashes indicative of exploitation attempts. Educate users to recognize and avoid phishing or social engineering tactics that could trigger the required user interaction. Additionally, conduct thorough code reviews and security testing of applications using DiaSymReader.dll to identify and mitigate potential exploitation vectors. Finally, maintain robust incident response plans tailored to memory corruption vulnerabilities to quickly contain and remediate any incidents.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- HeroDevs
- Date Reserved
- 2025-04-15T23:50:31.198Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bee1dfd5a2966cfc8014fd
Added to database: 9/8/2025, 2:02:07 PM
Last enriched: 9/8/2025, 2:16:51 PM
Last updated: 9/9/2025, 5:16:22 AM
Views: 11
Related Threats
CVE-2025-10123: Command Injection in D-Link DIR-823X
MediumCVE-2025-10122: SQL Injection in Maccms10
MediumCVE-2025-42958: CWE-250: Execution with Unnecessary Privileges in SAP_SE SAP NetWeaver
CriticalCVE-2025-42944: CWE-502: Deserialization of Untrusted Data in SAP_SE SAP Netweaver (RMI-P4)
CriticalCVE-2025-42938: CWE-79: Improper Neutralization of Input During Web Page Generation in SAP_SE SAP NetWeaver ABAP Platform
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.