<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dotnet — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/dotnet/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/dotnet/feed.xml" rel="self" type="application/rss+xml"/><item><title>Meridian Library Multiple Defense-in-Depth Gaps</title><link>https://feed.craftedsignal.io/briefs/2026-04-17-meridian-defense-gaps/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-17-meridian-defense-gaps/</guid><description>Multiple defense-in-depth gaps exist in Meridian versions prior to 2.1.1, including high severity issues related to bypassing safety caps on collection mapping that can lead to resource exhaustion, along with medium and low severity issues affecting constructor selection, telemetry, retry mechanisms, and exception handling.</description><content:encoded><![CDATA[<p>Meridian versions before 2.1.1 contain multiple vulnerabilities stemming from defense-in-depth gaps within the <code>Meridian.Mapping</code> and <code>Meridian.Mediator</code> components. Two high-severity issues involve bypassing the advertised <code>DefaultMaxCollectionItems</code> and <code>DefaultMaxDepth</code> safety caps, particularly when using the <code>IMapper.Map(source, destination)</code> overload or <code>.UseDestinationValue()</code> on collection-typed properties. These flaws can lead to resource exhaustion. Additional medium-severity issues include constructor invariant bypass, OpenTelemetry stack-trace information disclosure, retry amplification, and notification fan-out amplification. The vulnerabilities were patched in version 2.1.1, released on April 16, 2026. The issues affect applications using the Meridian library for object-object mapping and mediation. Successful exploitation could lead to denial-of-service conditions, information disclosure, and unexpected application behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends a crafted request to an application using Meridian, including a large or self-referential collection in the request payload.</li>
<li>The application&rsquo;s mapping logic utilizes <code>IMapper.Map(source, destination)</code> or <code>.UseDestinationValue()</code> on a collection property, triggering the vulnerable code path.</li>
<li>The <code>MappingEngine.TryMapCollectionOntoExisting</code> method processes the collection without enforcing <code>DefaultMaxCollectionItems</code>, leading to excessive memory consumption.</li>
<li>Collection-item recursion fails to increment <code>ResolutionContext.Depth</code>, allowing self-referential graphs to bypass <code>DefaultMaxDepth</code> and cause a stack overflow.</li>
<li>The unbounded collection processing consumes excessive CPU and memory resources, potentially blocking the worker thread.</li>
<li>Alternatively, an attacker exploits the <code>ObjectCreator.CreateWithConstructorMapping</code> vulnerability by providing input that bypasses constructor invariants due to the widest constructor being selected.</li>
<li>The application experiences a denial-of-service condition due to resource exhaustion or exhibits unintended behavior due to bypassed constructor invariants.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to significant consequences. An attacker can cause denial-of-service by exhausting server resources, potentially impacting all users of the affected application. Information disclosure is possible through OpenTelemetry stack traces, and bypassing constructor invariants can lead to unexpected application behavior and potential data corruption. The high-severity vulnerabilities related to collection mapping are particularly concerning due to the potential for easy exploitation through a single crafted request. The impact is mitigated by upgrading to version 2.1.1 of the <code>Meridian.Mapping</code> and <code>Meridian.Mediator</code> libraries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade to Meridian version 2.1.1 to patch the identified vulnerabilities, as documented in the <a href="https://github.com/UmutKorkmaz/meridian/blob/main/CHANGELOG.md#211---2026-04-16">v2.1.1 CHANGELOG</a>.</li>
<li>For applications that cannot be immediately upgraded, avoid using <code>mapper.Map(src, dst)</code> and <code>.UseDestinationValue()</code> on collection-typed destination members as a temporary workaround.</li>
<li>Implement explicit size limits on input collection deserialization before passing the payload to Meridian, as described in the <a href="#workarounds">Workarounds section</a> of this brief.</li>
<li>Consider disabling OpenTelemetry <code>exception.stacktrace</code> tag emission if your trace sink is not fully trusted, mitigating potential information disclosure.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-in-depth</category><category>resource-exhaustion</category><category>information-disclosure</category><category>dotnet</category></item><item><title>.NET Uncontrolled Resource Consumption Vulnerability (CVE-2026-26171)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dotnet-dos/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dotnet-dos/</guid><description>CVE-2026-26171 is a vulnerability in .NET that allows an unauthorized attacker to perform a denial-of-service attack over a network due to uncontrolled resource consumption.</description><content:encoded><![CDATA[<p>CVE-2026-26171 is a denial-of-service vulnerability affecting the .NET framework. This vulnerability stems from uncontrolled resource consumption, allowing an unauthenticated remote attacker to exhaust server resources. The vulnerability was published on April 14, 2026. Successful exploitation can lead to server unresponsiveness or complete service disruption. While the specific attack vector is not detailed in the source document, similar vulnerabilities in .NET have been exploited via crafted network requests that trigger excessive memory allocation or CPU usage. This vulnerability could affect any application running on a vulnerable .NET framework version, making it critical for organizations to patch their systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a .NET application running on a vulnerable system exposed to the network.</li>
<li>The attacker crafts a malicious network request designed to exploit the uncontrolled resource consumption vulnerability (CVE-2026-26171).</li>
<li>The crafted request is sent to the vulnerable .NET application.</li>
<li>The application processes the malicious request, triggering excessive resource allocation (e.g., memory or CPU).</li>
<li>Repeated or sustained malicious requests cause the server&rsquo;s resources to become exhausted.</li>
<li>Legitimate user requests are delayed or rejected due to resource exhaustion.</li>
<li>The .NET application becomes unresponsive, leading to a denial-of-service condition.</li>
<li>The server hosting the .NET application may crash, resulting in complete service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-26171 can lead to a denial-of-service condition, rendering .NET applications and the services they provide unavailable. The impact ranges from temporary service disruption to complete server crashes. The vulnerability has a CVSS v3.1 score of 7.5, indicating a high severity. The number of affected applications depends on the prevalence of vulnerable .NET framework versions within an organization&rsquo;s infrastructure. If successfully exploited, this can lead to significant business interruption and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided by Microsoft for CVE-2026-26171 as soon as possible to remediate the vulnerability (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26171)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26171)</a>.</li>
<li>Monitor network traffic for suspicious patterns indicative of denial-of-service attacks, such as a sudden surge in requests to .NET application endpoints. Deploy the Sigma rule detecting a high number of connections from a single source IP.</li>
<li>Implement resource monitoring on servers running .NET applications to detect unusual CPU or memory usage that may indicate exploitation attempts.</li>
<li>Review and harden network segmentation to limit the potential impact of a successful denial-of-service attack.</li>
<li>Consider using a Web Application Firewall (WAF) to filter malicious requests and mitigate potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-26171</category><category>dotnet</category><category>denial-of-service</category><category>dos</category><category>resource-consumption</category></item><item><title>.NET Spoofing Vulnerability (CVE-2026-32178)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dotnet-spoofing/</link><pubDate>Tue, 14 Apr 2026 18:17:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dotnet-spoofing/</guid><description>CVE-2026-32178 is a vulnerability in .NET that allows for network spoofing due to improper neutralization of special elements, potentially enabling attackers to impersonate legitimate entities.</description><content:encoded><![CDATA[<p>CVE-2026-32178 is a security vulnerability affecting .NET applications. This vulnerability stems from the improper neutralization of special elements, which can be exploited by an unauthorized attacker to perform spoofing attacks over a network. Successful exploitation of this vulnerability could allow an attacker to impersonate trusted entities or services, potentially leading to unauthorized access, data manipulation, or other malicious activities. The vulnerability was published on April 14, 2026. Given the widespread use of .NET in various applications and services, this vulnerability poses a significant risk to organizations utilizing affected .NET versions. Defenders need to implement appropriate mitigation strategies to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable .NET application that processes network-based input.</li>
<li>The attacker crafts a malicious network request containing special elements designed to exploit the improper neutralization vulnerability (CVE-2026-32178).</li>
<li>The vulnerable .NET application processes the malicious request without properly neutralizing the special elements.</li>
<li>Due to the lack of proper neutralization, the application misinterprets the special elements in the request.</li>
<li>The application performs actions based on the misinterpreted data, such as modifying data or granting unauthorized access.</li>
<li>The attacker leverages the spoofed identity or altered data to further compromise the system or network.</li>
<li>The attacker gains unauthorized access to sensitive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32178 could allow an attacker to perform network spoofing, potentially impacting confidentiality, integrity, and availability of affected systems. While the specific number of victims is unknown, the widespread use of .NET increases the potential for broad impact across various sectors. Consequences can range from data breaches and financial loss to reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-32178 as referenced in <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178</a>.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect potential exploitation attempts targeting .NET applications.</li>
<li>Monitor network traffic for suspicious patterns indicative of spoofing attacks, focusing on traffic to and from .NET applications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dotnet</category><category>spoofing</category><category>cve-2026-32178</category></item><item><title>Tmds.DBus Vulnerability Allows Signal Spoofing and Resource Exhaustion</title><link>https://feed.craftedsignal.io/briefs/2026-04-tmds-dbus-vuln/</link><pubDate>Thu, 09 Apr 2026 17:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tmds-dbus-vuln/</guid><description>Tmds.DBus and Tmds.DBus.Protocol are vulnerable to signal spoofing, resource exhaustion, and application crashes due to malformed messages from malicious D-Bus peers on the same bus.</description><content:encoded><![CDATA[<p>Tmds.DBus is a .NET library used for interacting with the D-Bus inter-process communication system. A vulnerability exists in versions prior to 0.92.0 for Tmds.DBus and 0.92.0 and 0.21.3 for Tmds.DBus.Protocol, allowing a malicious D-Bus peer on the same bus to perform several malicious actions. These include spoofing signals by impersonating the owner of a well-known name, exhausting system resources by sending messages with an excessive number of Unix file descriptors, and crashing the application by sending malformed message bodies that cause unhandled exceptions on the SynchronizationContext. This vulnerability could lead to denial of service or potentially allow for further exploitation within the affected application&rsquo;s context. Defenders need to ensure they are running patched versions of this software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious actor gains access to the same D-Bus instance as the target application.</li>
<li>The attacker identifies a well-known name that the target application utilizes.</li>
<li>The attacker crafts a malicious D-Bus message designed to impersonate the owner of the well-known name.</li>
<li>The attacker sends this spoofed signal to the target application through the D-Bus.</li>
<li>Alternatively, the attacker crafts a D-Bus message with an excessive number of Unix file descriptors.</li>
<li>The attacker sends the resource-intensive message, attempting to exhaust system resources.</li>
<li>Or the attacker crafts a malformed message body designed to cause an unhandled exception.</li>
<li>Successful exploitation leads to signal spoofing, resource exhaustion, or application crash, potentially leading to denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a malicious actor to disrupt services that rely on Tmds.DBus. By spoofing signals, an attacker can manipulate the behavior of applications. By exhausting system resources or crashing applications, the attacker can cause denial of service. While the specific number of victims or sectors affected is not detailed, the potential impact is significant for systems using vulnerable versions of Tmds.DBus.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Tmds.DBus to version 0.92.0 or later and Tmds.DBus.Protocol to version 0.92.0 or 0.21.3 or later to remediate CVE-2026-39959.</li>
<li>Monitor D-Bus traffic for suspicious patterns, such as messages with excessive file descriptors, by creating custom monitoring tools.</li>
<li>Implement application-level validation of D-Bus messages to prevent exploitation through malformed message bodies.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dbus</category><category>vulnerability</category><category>dotnet</category></item><item><title>PowerShell Loading .NET Assemblies via Reflection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-powershell-reflection-load/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-powershell-reflection-load/</guid><description>This analytic detects PowerShell scripts leveraging .NET reflection to load assemblies into memory, a technique commonly used by threat actors to bypass defenses and execute malicious code.</description><content:encoded><![CDATA[<p>This threat brief addresses the use of PowerShell to load .NET assemblies into memory using reflection, a technique frequently observed in advanced attacks. Threat actors, including those employing frameworks like Empire and Cobalt Strike, utilize this method to execute code directly in memory, evading traditional file-based security controls. The detection strategy focuses on PowerShell Script Block Logging (EventCode=4104), which captures the full commands executed, enabling analysis for specific reflection-related keywords. This behavior is a strong indicator of potential malicious activity, as it allows for unauthorized code execution, privilege escalation, and persistent access. Defenders should prioritize detection and response to such events to mitigate the risk of compromise. The technique allows attackers to bypass traditional defenses, execute code in memory, and potentially establish persistence within the targeted environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the system, possibly through phishing or exploiting a vulnerability.</li>
<li>PowerShell Execution: The attacker executes PowerShell, often obfuscated or encoded, to avoid detection.</li>
<li>Reflection Assembly Loading: The PowerShell script uses reflection techniques, such as <code>[System.Reflection.Assembly]::Load()</code>, to load a .NET assembly directly into memory.</li>
<li>Bypassing Security Controls: The in-memory execution bypasses traditional security controls that scan files on disk.</li>
<li>Malicious Code Execution: The loaded assembly contains malicious code, which could be a payload for lateral movement, data exfiltration, or other malicious activities.</li>
<li>Privilege Escalation: The malicious code may attempt to escalate privileges to gain higher-level access to the system.</li>
<li>Persistence: The attacker establishes persistence by creating scheduled tasks or modifying registry keys.</li>
<li>Lateral Movement: The attacker uses the compromised system as a springboard to move laterally within the network, compromising additional systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized code execution, privilege escalation, and persistent access within the environment. By loading .NET assemblies directly into memory, attackers can bypass traditional file-based security controls, making detection more challenging. This technique is often employed in advanced attacks, potentially affecting numerous systems across the network, leading to significant data breaches and system compromise. While specific victim counts are not available, the impact is considered high due to the potential for widespread damage and data loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging (EventCode=4104) on all endpoints to capture the full commands executed, as referenced in the description.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect PowerShell scripts loading .NET assemblies into memory via reflection.</li>
<li>Investigate and remediate any alerts generated by the Sigma rules, prioritizing systems with high-value data or critical functions.</li>
<li>Regularly review and update PowerShell execution policies to restrict the execution of unsigned or untrusted scripts.</li>
<li>Monitor PowerShell logs for suspicious activity, such as the use of reflection techniques to load assemblies from unusual locations.</li>
<li>Consult the references provided, specifically the Microsoft .NET API documentation and the Palantir article on event tracing, to deepen your understanding of the attack techniques and potential mitigations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>powershell</category><category>reflection</category><category>dotnet</category><category>memory-injection</category><category>attack.execution</category><category>attack.t1059.001</category></item></channel></rss>