- Description
- External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
- Products
- build_tools, visual_studio_2022, .net
CVSS 3.1
- Type
- Secondary
- Base score
- 8
- Impact score
- 5.9
- Exploitability score
- 2.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- secure@microsoft.com
- CWE-73
- Hype score
- Not currently trending
๐ด URGENT for Ubuntu Users ๐ด A critical .NET spoofing vulnerability (CVE-2025-26646) threatens #Ubuntu 22.04-25.04 systems. Patch dotnet8/dotnet9 runtimes NOW to prevent network-based attacks. ๐ Full patch guide: Read more: ๐ https://t.co/552duO7uLD https://t.co/
@Cezar_H_Linux
26 May 2025
77 Impressions
0 Retweets
4 Likes
0 Bookmarks
0 Replies
0 Quotes
โ ๏ธ Microsoft just dropped a bombshell! CVE-2025-26646 lets sneaky attackers masquerade as legit services via .NET & Visual Studio. Time to lock those filenames down! ๐ก๏ธ #Vulnerability #Security #WindowsForum https://t.co/1zDRQvU0Ly
@windowsforum
14 May 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐ด #Microsoft NET, Spoofing Vulnerability, #CVE-2025-26646 (Critical) https://t.co/kTeHXDl8nP
@dailycve
14 May 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-26646 External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network. https://t.co/07kDvfGfUt
@CVEnew
13 May 2025
446 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:build_tools:*:*:*:*:*:visual_studio:*:*",
"matchCriteriaId": "EAA124E7-65D9-47F0-9511-FC6ECCD0E6E6",
"versionEndExcluding": "17.13.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15DDEE89-4759-416F-89F8-EC9975C25B53",
"versionEndExcluding": "17.8.21",
"versionStartIncluding": "17.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "382952FA-438B-4792-B8BB-501D3654CA5A",
"versionEndExcluding": "17.10.15",
"versionStartIncluding": "17.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42F8FD3E-FFD8-4963-84E5-AFBFEA76418F",
"versionEndExcluding": "17.12.8",
"versionStartIncluding": "17.12.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A1AA7A3-18C1-4C90-ADB7-5070AC455451",
"versionEndExcluding": "17.13.7",
"versionStartIncluding": "17.13.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC60E71D-2EC5-46E1-AF1D-002D855EBE28",
"versionEndExcluding": "9.0.5",
"versionStartIncluding": "9.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A18F0AD-A304-42C4-A0E6-E74837FC6393",
"versionEndExcluding": "8.0.16",
"versionStartIncluding": "8.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
]