Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2284 articles · 112722 vulns · 36/41 feeds (7d)
← Back to list
9.1
CVE-2026-40372EXPLOITEDPATCHED
microsoft · asp.net core

ASP.NET Core Elevation of Privilege Vulnerability

Description

The security flaw (tracked as CVE-2026-40372) was found in the ASP.NET Core Data Protection cryptographic APIs, and it could allow unauthenticated attackers to gain SYSTEM privileges on affected devices by forging authentication cookies. Microsoft discovered the flaw following user reports that decryption was failing in their applications after installing the .NET 10.0.6 update release during this month's Patch Tuesday. A regression in the Microsoft.AspNetCore.DataProtection 10.0.0-10.0.6 NuGet packages causes the managed authenticated encryptor to compute its HMAC validation tag over the wrong bytes of the payload and then discard the computed hash in some cases. In these cases, the broken validation could allow an attacker to forge payloads that pass DataProtection's authenticity checks, and to decrypt previously-protected payloads in auth cookies, antiforgery tokens, TempData, OIDC state, etc. If an attacker used forged payloads to authenticate as a privileged user during the vulnerable window, they may have induced the application to issue legitimately-signed tokens (session refresh, API key, password reset link, etc.) to themselves. Those tokens remain valid after upgrading to 10.0.7 unless the DataProtection key ring is rotated. This vulnerability can also enable attackers to disclose files and modify data, but they cannot impact the system's availability.

Affected Products

VendorProductVersions
microsoftasp.net core10.0, 10.0.0, 10.0.1, 10.0.2, 10.0.3, 10.0.4, 10.0.5, 10.0.6

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
microsoftasp.netcert_advisory90%

References

  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40372(vendor-advisory, patch)

Related News (8 articles)

Tier B
CCCS Canada3h ago
Microsoft security advisory (AV26-377)
→ No new info (linked only)
Tier D
The Hacker News8h ago
Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug
→ No new info (linked only)
Tier B
BSI Advisories8h ago
[NEU] [hoch] Microsoft ASP.NET: Schwachstelle ermöglicht Privilegieneskalation
→ No new info (linked only)
Tier D
BleepingComputer9h ago
Microsoft releases emergency patches for critical ASP.NET flaw
→ No new info (linked only)
Tier B
CERT-FR18h ago
Vulnérabilité dans Microsoft .Net (22 avril 2026)
→ No new info (linked only)
Tier E
Hacker News21h ago
Critical .NET 10.0.6 vulnerability in DataProtection
→ No new info (linked only)
Tier C
VulDB21h ago
CVE-2026-40372 | Microsoft ASP.NET Core up to 10.0.6 signature verification
→ No new info (linked only)
Tier A
Microsoft MSRC1d ago
CVE-2026-40372 ASP.NET Core Elevation of Privilege Vulnerability
→ No new info (linked only)
CVSS 3.19.1 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
10.0.7
CWECWE-347, CWE-20
PublishedApr 21, 2026
Last enriched7h agov6
Tags
privilege escalationcryptographic vulnerabilityCVE-2026-40372important
Trending Score97
Source articles8
Independent8
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

MEDIUMCVE-2026-32201EXPKEV
Microsoft SharePoint Server Spoofing Vulnerability
Trending: 150
HIGHCVE-2026-33825EXPKEV
Microsoft Defender Elevation of Privilege Vulnerability
Trending: 143
HIGHCVE-2026-21262EXPKEV
SQL Server Elevation of Privilege Vulnerability
Trending: 32
HIGHCVE-2026-21523
GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability
Trending: 32
CRITICALCVE-2026-33824EXP
Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability
Trending: 31

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 21, 2026
Discovered by ZDM
Apr 21, 2026
Updated: description, exploitAvailable, activelyExploited
Apr 21, 2026
Updated: affectedVersions
Apr 21, 2026
Actively Exploited
Apr 22, 2026
Exploit Available
Apr 22, 2026
Patch Available
Apr 22, 2026
Updated: affectedVersions, cweIds, tags
Apr 22, 2026
Updated: description, tags
Apr 22, 2026
Updated: tags
Apr 22, 2026

Version History

v6
Last enriched 7h ago
v6Tier D7h ago

Updated severity from CRITICAL to HIGH and added 'important' tag.

tags
via The Hacker News
v5Tier D9h ago

Updated description with detailed technical information about the vulnerability and added CVE-2026-40372 to tags.

descriptiontags
via BleepingComputer
v4Tier D9h ago

Updated description with technical details, added affected versions, included new CWE, and added MITRE ATT&CK technique T1071.001.

affectedVersionscweIdstags
via BleepingComputer
v3Tier C21h ago

Updated affected versions to include 10.0.6, changed severity to HIGH, and noted no patch available.

affectedVersions
via VulDB
v2Tier A22h ago

Added a detailed description of the vulnerability and marked it as actively exploited with an exploit available.

descriptionexploitAvailableactivelyExploited
via Microsoft MSRC
v122h ago

Initial creation