CVE-2023-36038 Overview
CVE-2023-36038 is a Denial of Service (DoS) vulnerability affecting ASP.NET Core applications. This vulnerability allows unauthenticated remote attackers to disrupt service availability by exploiting weaknesses in how ASP.NET Core handles certain requests. The vulnerability is classified as CWE-400 (Uncontrolled Resource Consumption), indicating that it enables attackers to consume excessive system resources, leading to service degradation or complete unavailability.
Critical Impact
Remote unauthenticated attackers can trigger a Denial of Service condition against ASP.NET Core applications, potentially disrupting business operations and affecting application availability for legitimate users.
Affected Products
- Microsoft Visual Studio 2022 (multiple versions)
- Microsoft ASP.NET Core 8.0.0
- Microsoft .NET 8.0.0 (Preview 1 through Preview 7, RC1, and RC2)
Discovery Timeline
- November 14, 2023 - CVE-2023-36038 published to NVD
- November 21, 2024 - Last updated in NVD database
Technical Details for CVE-2023-36038
Vulnerability Analysis
This ASP.NET Core Denial of Service vulnerability stems from improper resource management when processing certain types of requests. The vulnerability is network-accessible and requires no authentication or user interaction to exploit, making it particularly concerning for internet-facing ASP.NET Core applications.
The flaw affects the availability of the application without impacting confidentiality or integrity, which is characteristic of classic resource exhaustion attacks. Attackers can remotely trigger conditions that cause the ASP.NET Core runtime to consume excessive resources, eventually leading to service degradation or complete denial of service.
Root Cause
The vulnerability is rooted in uncontrolled resource consumption (CWE-400) within the ASP.NET Core framework. When the affected components receive specially crafted requests, the application fails to properly limit resource usage, allowing attackers to exhaust system resources such as CPU cycles, memory, or connection pools. This lack of proper resource throttling enables sustained denial of service attacks against vulnerable applications.
Attack Vector
The attack vector for CVE-2023-36038 is network-based, requiring no privileges or user interaction. An attacker can exploit this vulnerability by sending malicious requests to a vulnerable ASP.NET Core application over the network. The attack has low complexity, meaning it can be executed without sophisticated tools or techniques.
The vulnerability affects applications built on ASP.NET Core 8.0.0 and .NET 8.0.0 preview releases, as well as projects developed in Visual Studio 2022. Due to the network-accessible nature of the vulnerability, any internet-facing or internally accessible ASP.NET Core application running a vulnerable version is potentially at risk.
Detection Methods for CVE-2023-36038
Indicators of Compromise
- Unusual spikes in CPU or memory utilization on servers hosting ASP.NET Core applications
- Increased response times or timeout errors from ASP.NET Core web services
- Application pool restarts or process crashes in IIS or Kestrel servers
- Abnormal patterns of incoming HTTP requests from single or multiple sources
Detection Strategies
- Monitor application performance metrics for sudden degradation in response times
- Implement web application firewall (WAF) rules to detect and block anomalous request patterns
- Enable detailed logging in ASP.NET Core to capture request characteristics during potential attacks
- Configure alerts for process crashes or unexpected restarts of ASP.NET Core worker processes
Monitoring Recommendations
- Set up real-time monitoring for server resource utilization including CPU, memory, and network I/O
- Enable application insights or equivalent telemetry to track request rates and error patterns
- Monitor IIS/Kestrel logs for patterns indicative of denial of service attempts
- Implement threshold-based alerting for abnormal traffic volumes targeting ASP.NET Core endpoints
How to Mitigate CVE-2023-36038
Immediate Actions Required
- Apply the latest security updates from Microsoft for ASP.NET Core, .NET, and Visual Studio 2022
- Review all ASP.NET Core applications in your environment to identify affected versions
- Prioritize patching internet-facing applications that are most susceptible to remote exploitation
- Consider temporarily implementing rate limiting or request filtering as an interim measure
Patch Information
Microsoft has released security updates to address CVE-2023-36038. Organizations should consult the Microsoft Security Update Guide for detailed patch information and download links. The updates address the underlying resource consumption issue in the affected ASP.NET Core versions.
For Visual Studio 2022 users, ensure the IDE is updated to the latest version that includes the patched .NET SDK and runtime components. For .NET 8.0.0 applications, upgrade to the general availability release or a patched preview/RC version as specified in Microsoft's advisory.
Workarounds
- Implement request rate limiting at the web server or load balancer level to reduce the impact of potential attacks
- Configure connection timeouts and request size limits in Kestrel or IIS to prevent resource exhaustion
- Deploy a web application firewall (WAF) with rules to detect and block suspicious request patterns
- Consider network segmentation to limit exposure of vulnerable applications from untrusted networks
# Example: Configure Kestrel limits in Program.cs
# Add request rate limiting and connection limits
# Refer to Microsoft documentation for specific configuration options
# Update .NET SDK and runtime to patched versions
dotnet --list-sdks
dotnet --list-runtimes
# Update to latest patched version
dotnet tool update --global dotnet-sdk
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


