Microsoft Rushes Patches for Critical ASP.NET Core Privilege Escalation Flaw
Microsoft has issued out-of-band updates to address a critical privilege escalation vulnerability (CVE-2026-40372) in ASP.NET Coreβs Data Protection APIs. BleepingComputer reports that unauthenticated attackers could exploit this flaw by forging authentication cookies to gain SYSTEM privileges. The vulnerability stems from a regression in specific NuGet package versions where the cryptographic APIs incorrectly compute or discard HMAC validation tags, allowing forged or decrypted payloads.
This flaw enables attackers to bypass authenticity checks and potentially decrypt protected data like authentication cookies, antiforgery tokens, and OIDC state. While the vulnerability does not impact system availability, successful exploitation could allow an attacker to impersonate privileged users and issue their own legitimate tokens, such as session refresh or API keys. Microsoft advises that affected applications should rotate their Data Protection keys even after applying the patch to fully mitigate the risk.
What This Means For You
- If your organization utilizes ASP.NET Core Data Protection APIs, immediately verify that affected NuGet packages (versions 10.0.0 through 10.0.6) have been updated to 10.0.7 or later. Critically, you must rotate your Data Protection keys to invalidate any potentially forged or compromised tokens issued during the vulnerable window.
Related ATT&CK Techniques
π‘οΈ Detection Rules
3 rules Β· 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free β export to any SIEM format via the Intel Bot.
Exploit ASP.NET Core Data Protection API Forged Cookie
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| ASP.NET-Core-Privilege-Escalation | Privilege Escalation | ASP.NET Core |