CVE-2026-23666 – .NET Framework Denial of Service Vulnerability

CVSS 7.5 IMPORTANT

"This flaw can let a remote attacker knock over a critical service without ever logging in, turning routine network access into a business disruption risk."

A race condition in .NET Framework can let an unauthorized attacker trigger a denial of service over the network by abusing concurrent execution against a shared resource that is not properly synchronized. Microsoft lists this issue under .NET Framework and notes that it affects availability rather than confidentiality or integrity. Based on the MSRC data you provided and the April 2026 Security Update Guide release entry, the issue is not marked as publicly exploited, but proof-of-concept exploit maturity is present, which means defenders should not treat it as theoretical.

CVSS Score: 7.5
SEVERITY: Critical
THREAT: Denial of Service

THREAT: Remote unauthenticated denial of service. An attacker may be able to send crafted network traffic that triggers a race condition and causes the targeted application or service to hang, crash, or become unavailable. This is especially dangerous for exposed services or business systems that rely on .NET availability to keep operations running.

EXPLOITS: Microsoft’s accessible advisory data indicates the vulnerability is not publicly disclosed and not exploited at the time of release. However, the exploit code maturity is listed as Proof-of-Concept, which means exploit methods are considered plausible enough to raise risk. There is no confirmed zero-day exploitation in the MSRC data provided.

TECHNICAL SUMMARY:
This vulnerability is caused by improper synchronization during concurrent execution in .NET Framework. When multiple operations interact with a shared resource at the same time, the application may fail to handle the resulting exceptional condition safely. An attacker can exploit this weakness remotely over a network, without privileges and without user interaction, by sending requests or inputs that force the vulnerable code path into a race condition. The likely outcome is service instability, process failure, or application unavailability. While the issue does not appear to expose data or allow tampering, it can directly affect system uptime and reliability.

EXPLOITABILITY:
Affects systems running vulnerable versions of the .NET Framework. The issue is remotely reachable and does not require authentication or user interaction, which lowers the barrier to attack. Exploitation would involve triggering concurrent operations in a way that causes the vulnerable service or application to fail.

BUSINESS IMPACT:
This is the kind of weakness that can turn a stable business service into an outage target. Even without stealing data, an attacker may be able to interrupt customer-facing applications, internal business workflows, APIs, or backend processing jobs. For organizations that depend on .NET-based services for daily operations, repeated crashes or service hangs can lead to downtime, lost productivity, missed transactions, and incident response costs. The real danger is disruption: the business keeps running until a remote attacker decides it should not.

WORKAROUND:
If the patch cannot be applied immediately, reduce exposure by limiting access to internet-facing .NET services, restricting inbound traffic to trusted networks, and monitoring for unusual application crashes or repeated request patterns. Where possible, use load balancing, restart policies, and service isolation to reduce the impact of a successful denial-of-service attempt.

URGENCY:
This vulnerability deserves fast attention because it is remotely reachable, requires no authentication, and has proof-of-concept exploit maturity in the MSRC data. Even though Microsoft does not mark it as actively exploited, availability attacks are often attractive because they are simple, noisy, and immediately disruptive. Any organization running exposed or business-critical .NET services should prioritize this update before opportunistic attackers turn a race condition into an outage.

Key Details

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
CWE Classification
CWE-755
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.