CVE-2026-32177: Heap-Based Buffer Overflow in .NET Core and Visual Studio
Vulnerability ID: CVE-2026-32177
CVSS Score: 7.3
Published: 2026-05-12
CVE-2026-32177 is a high-severity heap-based buffer overflow affecting multiple versions of Microsoft .NET and Visual Studio. Triggered by insufficient input validation during file processing, the vulnerability permits local privilege escalation when a user opens a specially crafted file.
TL;DR
A heap-based buffer overflow in the .NET runtime allows local privilege escalation when users open maliciously crafted files in vulnerable host applications like Visual Studio.
Technical Details
- CWE ID: CWE-122
- Attack Vector: Local (AV:L)
- CVSS v3.1 Score: 7.3 (High)
- EPSS Probability: 0.10%
- Primary Impact: Local Elevation of Privilege
- Exploit Status: Unexploited / No PoC
- CISA KEV: Not Listed
Affected Systems
- .NET 10.0
- .NET 9.0
- .NET 8.0
- Microsoft .NET Framework 3.5
- Microsoft .NET Framework 4.7.2
- Microsoft .NET Framework 4.8
- Microsoft .NET Framework 4.8.1
- Microsoft Visual Studio 2022
- Microsoft Visual Studio 2026
-
.NET 10.0: 10.0.0 to 10.0.7 (Fixed in:
10.0.8) -
.NET 9.0: 9.0.0 to 9.0.15 (Fixed in:
9.0.16) -
.NET 8.0: 8.0.0 to 8.0.26 (Fixed in:
8.0.27) -
Microsoft .NET Framework 3.5, 4.7.2, 4.8, 4.8.1: All prior to patch (Fixed in:
4.8.9334.0 / 4.8.4802.0) -
Microsoft Visual Studio 2022: 17.12.0 to 17.12.19, 17.14.0 to 17.14.30 (Fixed in:
17.12.20 / 17.14.31) -
Microsoft Visual Studio 2026: 18.5.0 to 18.5.2 (Fixed in:
18.5.3)
Mitigation Strategies
- Apply Microsoft May 2026 Patch Tuesday security updates across all affected .NET environments.
- Enforce the principle of least privilege to prevent users from running development tools or applications with administrative rights.
- Implement file screening and security controls to block suspicious or untrusted files.
Remediation Steps:
- Inventory all systems running .NET 8.0, 9.0, 10.0, and .NET Framework.
- Identify installations of Visual Studio 2022 and 2026.
- Deploy the specific fixed versions listed in the MSRC advisory (e.g., .NET 10.0.8, VS 2026 18.5.3).
- Verify the patch installation by checking assembly file versions.
References
- MSRC Advisory
- CVE.org Record
- NVD Record
- ZDI May 2026 Review
- OffSeq Threat Radar
- Rapid7 Analysis
- Sophos Blog
Read the full report for CVE-2026-32177 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)