Flash.itsportsbetDocsTechnology
Related
Meta’s Open-Source AI Model Revolutionizes US Concrete ProductionSteam Controller Accessory Turns Gamepad Into Portable Gaming Rig on Launch DayGoogle's Pixel Laptop and 'Pixel Glow' Notification System Leak via Android 17 Beta 4The Flame Malware Attack and Quantum Computing Threats: Lessons for Crypto SecurityHow Flight Recorder in Go 1.25Apple's iOS 27 to Overhaul Siri, Add Satellite Internet, and Prioritize Stability5 Must-Read Sci-Fi & Fantasy Books Hitting Shelves This May 202610 Key Enhancements in Libcamera 0.7.1: A Game-Changer for Linux Camera Support

Why Microsoft issues emergency update for macOS and Linux ASP.NET threat

Last updated: 2026-04-30 18:44:28 · Technology

It can be exploited to allow unauthenticated attackers to forge authentication payloads during the HMAC validation process, which is used to verify the integrity and authenticity of data exchanged between a client and a server. Microsoft released an emergency patch for its ASP.NET Core to fix a high-severity vulnerability that allows unauthenticated attackers to gain SYSTEM privileges on devices that use the Web development framework to run Linux or macOS apps. The software maker said Tuesday evening that the vulnerability, tracked as CVE-2026-40372, affects versions 10.0.0 through 10.0.6 of the Microsoft.AspNetCore.DataProtection NuGet, a package that’s part of the framework. The critical flaw stems from a faulty verification of cryptographic signatures.

Beware: Forged credentials survive patching

During the time users ran a vulnerable version of the package, they were left open to an attack that would allow unauthenticated people to gain sensitive SYSTEM privileges that would allow full compromise of the underlying machine. Even after the vulnerability is patched, devices may still be compromised if authentication credentials created by a threat actor aren’t purged.Read full article Comments

microsoft issues emergency
Image via Flickr
Why Microsoft issues emergency update for macOS and Linux ASP.NET threat
Source: feeds.arstechnica.com