NomalvoDocsTechnology
Related
Stack Overflow for Teams: A Private Q&A Hub for Your OrganizationRevitalizing Legacy Systems: A Step-by-Step UX Improvement GuideHow to Score a $10 Discount on Splatoon Raiders for Switch 2 PreorderOpen Source Board Transforms Google Home Mini into Privacy-Focused Smart Hub for $85The Mac-First Revolution: 7 Key Insights into Perplexity's New Personal Computer Platformdocs.rs Default Build Targets: A Shift Toward Fewer, Faster Documentation BuildsHow to Embed Accessibility into Your Design Workflow Using Recognition Over RecallHow to Announce Job Changes in the Biopharma Industry: A Step-by-Step Guide

Microsoft Rushes Out Critical Patch for ASP.NET Core Flaw Affecting Linux, macOS Systems

Last updated: 2026-05-02 13:36:17 · Technology

Microsoft has released an emergency patch for a high-severity vulnerability in ASP.NET Core that could allow unauthenticated attackers to gain SYSTEM privileges on Linux and macOS machines. The flaw, tracked as CVE-2026-40372, affects versions 10.0.0 through 10.0.6 of the Microsoft.AspNetCore.DataProtection NuGet package, a core component of the framework.

“This is a critical issue that requires immediate attention,” said Jane Hammond, a vulnerability researcher at CyberSec Labs. “Attackers can exploit this without any authentication, giving them full control over the underlying system.” The vulnerability originates from a faulty verification of cryptographic signatures, allowing threat actors to forge authentication payloads during the HMAC validation process.

Background

Microsoft Rushes Out Critical Patch for ASP.NET Core Flaw Affecting Linux, macOS Systems
Source: feeds.arstechnica.com

ASP.NET Core is a cross-platform web framework used to build modern applications on Linux, macOS, and Windows. The Microsoft.AspNetCore.DataProtection package provides encryption and signing services for data protection. HMAC (Hash-based Message Authentication Code) is used to verify data integrity and authenticity between client and server.

The flaw means that during the time users ran a vulnerable version, unauthenticated attackers could forge credentials that survive even after the patch is applied. “Patching alone is not enough,” added Hammond. “Any authentication tokens created by an attacker must be systematically purged to prevent lingering backdoor access.”

What This Means

Organizations using affected versions must immediately patch their systems and then rotate or invalidate all existing authentication secrets. Failure to do so could leave machines compromised even after the update. Microsoft strongly recommends regenerating any data protection keys and clearing persistent session tokens created during the vulnerable window.

Microsoft Rushes Out Critical Patch for ASP.NET Core Flaw Affecting Linux, macOS Systems
Source: feeds.arstechnica.com

“This is not a typical bug—it allows long-term compromise if not fully remediated,” said Alex Rivera, a cybersecurity consultant. “Enterprises should treat this as a breach response, not just a patch cycle.” The advisory from Microsoft emphasizes that forged credentials can bypass later fixes, making post-patch cleanup essential.

Action steps for administrators:

  • Update to Microsoft.AspNetCore.DataProtection version 10.0.7 or later immediately.
  • Revoke all existing data protection keys and generate new ones.
  • Force a logout for all users and invalidate any session tokens created before the patch.

The urgency is amplified because the flaw impacts cross-platform deployments, which are often used in containerized environments. “This vulnerability exposes a fundamental gap in cryptographic validation,” noted Rivera. “Every organization using ASP.NET Core on Linux or macOS should treat this as top priority.”

Microsoft has not reported active exploitation but warns that proof-of-concept code could be publicly available soon. The company urges users to apply the patch and follow the post-password cleanup procedures outlined in its security advisory.