CVE-2026-42899 - ASP.NET Core Infinite Loop Denial of Service
CVE-2026-42899 describes an infinite loop vulnerability in ASP.NET Core that allows an unauthorized attacker to perform a denial of service attack over a network.
CVE-2026-42899 details a denial-of-service vulnerability affecting ASP.NET Core. The vulnerability stems from a loop with an unreachable exit condition, effectively creating an infinite loop. An unauthorized attacker can exploit this flaw to exhaust server resources, leading to a denial of service for legitimate users. Microsoft has acknowledged this vulnerability and assigned it a CVSS v3.1 score of 7.5, highlighting the potential impact. Exploitation occurs over a network, requiring no user interaction or privileges. This vulnerability poses a significant risk to web applications built on ASP.NET Core, potentially disrupting services and impacting availability. Defenders should prioritize patching and consider implementing mitigations to prevent exploitation.
Attack Chain
- The attacker sends a specially crafted HTTP request to an ASP.NET Core endpoint.
- The request triggers the vulnerable code path containing the infinite loop.
- The application enters an infinite loop, consuming CPU resources.
- As the CPU usage increases, the server’s performance degrades.
- The server becomes unresponsive to legitimate user requests.
- The attacker continues to send malicious requests to maintain the denial of service.
- The server eventually exhausts its resources (CPU, memory).
Impact
Successful exploitation of CVE-2026-42899 leads to a denial-of-service condition on ASP.NET Core applications. This can result in website unavailability, disrupted services, and potential financial losses due to downtime. The vulnerability can be exploited remotely without authentication, making it easily accessible to attackers. The impact is significant, as affected applications become unusable until the issue is resolved. The high CVSS score of 7.5 reflects the severity of the potential disruption and the relative ease of exploitation.
Recommendation
- Apply the security update provided by Microsoft to patch CVE-2026-42899 on all ASP.NET Core servers (reference: Microsoft Security Update Guide).
- Deploy the Sigma rule provided below to detect potential exploitation attempts by monitoring for abnormal CPU utilization patterns (reference: Sigma rule).
- Monitor web server logs for suspicious requests that might be triggering the infinite loop (reference: webserver logs).
Detection coverage 2
Detects CVE-2026-42899 Exploitation Attempt — High CPU Usage by ASP.NET Core
mediumDetects CVE-2026-42899 exploitation — Monitors for sustained high CPU usage by the ASP.NET Core process, which could indicate an infinite loop.
Detects CVE-2026-42899 Exploitation Attempt - Excessive Requests to Specific Endpoint
mediumDetects CVE-2026-42899 exploitation — Tracks the number of requests to a specific endpoint, triggering an alert if a threshold is exceeded, which could indicate an attempt to trigger an infinite loop.
Detection queries are available on the platform. Get full rules →