Miggo Logo

CVE-2023-33170: Microsoft Security Advisory CVE-2023-33170: .NET Security Feature Bypass Vulnerability

8.1

CVSS Score
3.1

Basic Information

EPSS Score
0.35369%
Published
7/11/2023
Updated
6/3/2024
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
Microsoft.AspNetCore.Identitynuget< 2.1.392.1.39
Microsoft.AspNet.Identity.Owinnuget< 2.2.42.2.4
Microsoft.AspNetCore.App.Runtime.linux-armnuget< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.linux-arm64nuget< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.linux-musl-armnuget< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64nuget< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.linux-x64nuget< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.osx-x64nuget< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.win-armnuget< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.win-arm64nuget< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.win-x64nuget< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.win-x86nuget< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.win-x86nuget>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.win-x64nuget>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.win-arm64nuget>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.win-armnuget>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.osx-x64nuget>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-x64nuget>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64nuget>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-musl-armnuget>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-armnuget>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-arm64nuget>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.osx-arm64nuget>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-musl-x64nuget>= 7.0.0, < 7.0.97.0.9
Microsoft.AspNetCore.App.Runtime.linux-musl-x64nuget< 6.0.206.0.20
Microsoft.AspNetCore.App.Runtime.osx-arm64nuget< 6.0.206.0.20

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description indicates a race condition (CWE-362) in account lockout mechanisms. The Fedora security advisories explicitly reference the SignInManager<TUser>.PasswordSignInAsync method as containing the race condition. This method is responsible for password validation and lockout management in ASP.NET Core Identity. The race condition would occur between incrementing the failed access counter and checking the lockout status, allowing attackers to submit more attempts than permitted before the lockout state is updated.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

# Mi*roso*t S**urity **visory *V*-****-*****: .N*T S**urity ***tur* *yp*ss Vuln*r**ility ## *x**utiv* summ*ry Mi*roso*t is r*l**sin* t*is s**urity **visory to provi** in*orm*tion **out * vuln*r**ility in *SP.N*T *or* *.* *n* **ov*. T*is **visory *l

Reasoning

T** vuln*r**ility **s*ription in*i**t*s * r*** *on*ition (*W*-***) in ***ount lo*kout m****nisms. T** ***or* s**urity **visori*s *xpli*itly r***r*n** t** `Si*nInM*n***r<TUs*r>.P*sswor*Si*nIn*syn*` m*t*o* *s *ont*inin* t** r*** *on*ition. T*is m*t*o*