CVE-2026-40372: ASP.NET Core Elevation of Privilege Vulnerability
Vulnerability ID: CVE-2026-40372
CVSS Score: 9.1
Published: 2026-04-21
A critical Elevation of Privilege (EoP) vulnerability exists in the Microsoft.AspNetCore.DataProtection library within ASP.NET Core 10.0. A logic flaw in the cryptographic signature verification routine of the Managed Authenticated Encryptor allows unauthorized attackers to bypass integrity checks by submitting an all-zero HMAC, enabling the forgery of protected payloads such as authentication cookies and antiforgery tokens.
TL;DR
ASP.NET Core 10.0 contains a critical EoP flaw (CVSS 9.1) where the managed DataProtection encryptor incorrectly validates payloads with an all-zero HMAC. Attackers can forge authentication cookies to gain administrative privileges without prior access. Patch to 10.0.7 and rotate cryptographic keys immediately.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-347
- Attack Vector: Network
- CVSS v3.1 Score: 9.1 (Critical)
- Impact: Elevation of Privilege / Authentication Bypass
- Exploit Status: Proof of Concept Available
- CISA KEV: Not Listed
Affected Systems
- Linux host environments running ASP.NET Core 10.0
- macOS host environments running ASP.NET Core 10.0
- Any system explicitly configured to use the Managed Authenticated Encryptor in .NET 10
-
ASP.NET Core: 10.0.0 - 10.0.6 (Fixed in:
10.0.7) -
Microsoft.AspNetCore.DataProtection: 10.0.0 - 10.0.6 (Fixed in:
10.0.7)
Mitigation Strategies
- Upgrade Microsoft.AspNetCore.DataProtection to version 10.0.7 or higher.
- Rotate the DataProtection key ring to invalidate previously forged payloads.
- Audit logs for anomalous authentication patterns or high volumes of DataProtection decryption errors.
- Revoke long-lived artifacts (API keys, password reset links) generated during the vulnerable window.
Remediation Steps:
- Identify all ASP.NET Core projects utilizing the net10.0 target framework.
- Update the Microsoft.AspNetCore.DataProtection NuGet package to version 10.0.7.
- Deploy the updated application binaries to the hosting environment.
- Execute an administrative script or deployment routine calling IKeyManager.RevokeAllKeys to rotate cryptographic keys.
- Monitor application logs to verify successful token reissuance for legitimate users.
References
- Microsoft Security Advisory
- CVE.org Record
- GitHub Announcement
- GitHub Issue (Reproduction)
- Technical Analysis
Read the full report for CVE-2026-40372 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)