Miggo Logo

CVE-2024-38168: Microsoft Security Advisory CVE-2024-38168 | .NET Denial of Service Vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.81619%
Published
8/13/2024
Updated
8/13/2024
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
Microsoft.AspNetCore.App.Runtime.win-armnuget>= 8.0.0, < 8.0.88.0.8
Microsoft.AspNetCore.App.Runtime.win-arm64nuget>= 8.0.0, < 8.0.88.0.8
Microsoft.AspNetCore.App.Runtime.win-x64nuget>= 8.0.0, < 8.0.88.0.8
Microsoft.AspNetCore.App.Runtime.win-x86nuget>= 8.0.0, < 8.0.88.0.8

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability affects ASP.NET HTTP.sys on Windows and is tied to uncontrolled resource consumption (CWE-400). HTTP.sys request processing and queue management components are the most likely candidates for improper resource handling. While no explicit patch details are provided, historical HTTP.sys vulnerabilities (e.g., CVE-2022-34713) and the Windows-specific nature of the issue suggest core request handling functions in the Microsoft.AspNetCore.Server.HttpSys namespace are involved. Confidence is medium due to reliance on component analysis rather than explicit code references.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

# Mi*roso*t S**urity **visory *V*-****-***** | .N*T **ni*l o* S*rvi** Vuln*r**ility ## <* n*m*="*x**utiv*-summ*ry"></*>*x**utiv* summ*ry Mi*roso*t is r*l**sin* t*is s**urity **visory to provi** in*orm*tion **out * vuln*r**ility in .N*T *.*. T*is **

Reasoning

T** vuln*r**ility *****ts *SP.N*T *TTP.sys on Win*ows *n* is ti** to un*ontroll** r*sour** *onsumption (*W*-***). *TTP.sys r*qu*st pro**ssin* *n* qu*u* m*n***m*nt *ompon*nts *r* t** most lik*ly **n*i**t*s *or improp*r r*sour** **n*lin*. W*il* no *xpl