{"api_version":"1","generated_at":"2026-04-22T21:27:32+00:00","cve":"CVE-2023-38180","urls":{"html":"https://cve.report/CVE-2023-38180","api":"https://cve.report/api/cve/CVE-2023-38180.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-38180","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-38180"},"summary":{"title":"Microsoft .NET Core and Visual Studio Denial-of-Service Vulnerability","description":".NET and Visual Studio Denial of Service Vulnerability","state":"PUBLIC","assigner":"secure@microsoft.com","published_at":"2023-08-08 19:15:00","updated_at":"2023-08-20 03:15:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/","refsource":"MISC","tags":[],"title":"[SECURITY] Fedora 37 Update: dotnet7.0-7.0.110-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180","name":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180","refsource":"MISC","tags":[],"title":"Security Update Guide - Microsoft Security Response Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/","refsource":"MISC","tags":[],"title":"[SECURITY] Fedora 38 Update: dotnet7.0-7.0.110-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-38180","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38180","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"38180","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":".net","cpe6":"6.0.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"38180","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":".net","cpe6":"7.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"38180","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"asp.net_core","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"38180","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visual_studio_2022","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2023","cve_id":"38180","cve":"CVE-2023-38180","vendorProject":"Microsoft","product":".NET Core and Visual Studio","vulnerabilityName":"Microsoft .NET Core and Visual Studio Denial-of-Service Vulnerability","dateAdded":"2023-08-09","shortDescription":"Microsoft .NET Core and Visual Studio contain an unspecified vulnerability that allows for denial-of-service (DoS).","requiredAction":"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.","dueDate":"2023-08-30","knownRansomwareCampaignUse":"Unknown","notes":"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-38180;  https://nvd.nist.gov/vuln/detail/CVE-2023-38180","cwes":"","catalogVersion":"2026.04.22","updated_at":"2026-04-22 20:03:10"},"epss":{"cve_year":"2023","cve_id":"38180","cve":"CVE-2023-38180","epss":"0.008820000","percentile":"0.754150000","score_date":"2026-04-21","updated_at":"2026-04-22 00:07:42"},"legacy_qids":[{"cve":"CVE-2023-38180","qid":"160871","title":"Oracle Enterprise Linux Security Update for .net 6.0 (ELSA-2023-4645)"},{"cve":"CVE-2023-38180","qid":"160872","title":"Oracle Enterprise Linux Security Update for .net 6.0 (ELSA-2023-4644)"},{"cve":"CVE-2023-38180","qid":"160873","title":"Oracle Enterprise Linux Security Update for .net 7.0 (ELSA-2023-4642)"},{"cve":"CVE-2023-38180","qid":"160874","title":"Oracle Enterprise Linux Security Update for .net 7.0 (ELSA-2023-4643)"},{"cve":"CVE-2023-38180","qid":"199643","title":"Ubuntu Security Notification for .NET Vulnerabilities (USN-6278-1)"},{"cve":"CVE-2023-38180","qid":"199647","title":"Ubuntu Security Notification for .NET Vulnerabilities (USN-6278-2)"},{"cve":"CVE-2023-38180","qid":"241945","title":"Red Hat Update for .net 6.0 (RHSA-2023:4639)"},{"cve":"CVE-2023-38180","qid":"241947","title":"Red Hat Update for .net 6.0 (RHSA-2023:4640)"},{"cve":"CVE-2023-38180","qid":"241948","title":"Red Hat Update for .net 7.0 security (RHSA-2023:4643)"},{"cve":"CVE-2023-38180","qid":"241949","title":"Red Hat Update for .net 6.0 security (RHSA-2023:4645)"},{"cve":"CVE-2023-38180","qid":"241950","title":"Red Hat Update for rh-dotnet60-dotnet security (RHSA-2023:4641)"},{"cve":"CVE-2023-38180","qid":"241952","title":"Red Hat Update for .net 6.0 security (RHSA-2023:4644)"},{"cve":"CVE-2023-38180","qid":"241953","title":"Red Hat Update for .net 7.0 security (RHSA-2023:4642)"},{"cve":"CVE-2023-38180","qid":"284428","title":"Fedora Security Update for dotnet6.0 (FEDORA-2023-cbc688b8ca)"},{"cve":"CVE-2023-38180","qid":"284429","title":"Fedora Security Update for dotnet6.0 (FEDORA-2023-25112489ab)"},{"cve":"CVE-2023-38180","qid":"503161","title":"Alpine Linux Security Update for dotnet6-build"},{"cve":"CVE-2023-38180","qid":"503165","title":"Alpine Linux Security Update for dotnet6-runtime"},{"cve":"CVE-2023-38180","qid":"503169","title":"Alpine Linux Security Update for dotnet7-build"},{"cve":"CVE-2023-38180","qid":"503170","title":"Alpine Linux Security Update for dotnet7-runtime"},{"cve":"CVE-2023-38180","qid":"506005","title":"Alpine Linux Security Update for dotnet6-build"},{"cve":"CVE-2023-38180","qid":"506013","title":"Alpine Linux Security Update for dotnet6-runtime"},{"cve":"CVE-2023-38180","qid":"506021","title":"Alpine Linux Security Update for dotnet7-build"},{"cve":"CVE-2023-38180","qid":"506026","title":"Alpine Linux Security Update for dotnet7-runtime"},{"cve":"CVE-2023-38180","qid":"92047","title":"Microsoft .NET Security Update for August 2023"},{"cve":"CVE-2023-38180","qid":"92052","title":"Microsoft Visual Studio Security Updates for August 2023"},{"cve":"CVE-2023-38180","qid":"941230","title":"AlmaLinux Security Update for .NET (ALSA-2023:4644)"},{"cve":"CVE-2023-38180","qid":"941231","title":"AlmaLinux Security Update for .NET (ALSA-2023:4642)"},{"cve":"CVE-2023-38180","qid":"941233","title":"AlmaLinux Security Update for .NET (ALSA-2023:4643)"},{"cve":"CVE-2023-38180","qid":"941234","title":"AlmaLinux Security Update for .NET (ALSA-2023:4645)"},{"cve":"CVE-2023-38180","qid":"941420","title":"AlmaLinux Security Update for .NET (ALSA-2023:4645)"},{"cve":"CVE-2023-38180","qid":"961031","title":"Rocky Linux Security Update for .NET (RLSA-2023:4645)"},{"cve":"CVE-2023-38180","qid":"961038","title":"Rocky Linux Security Update for .NET (RLSA-2023:4643)"},{"cve":"CVE-2023-38180","qid":"994793","title":"DotNet (Nuget) Security Update for Microsoft.AspNetCore.App.Runtime.win-arm64 (GHSA-vmch-3w2x-vhgq)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-38180","ASSIGNER":"secure@microsoft.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":".NET and Visual Studio Denial of Service Vulnerability"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Denial of Service"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Microsoft","product":{"product_data":[{"product_name":"ASP.NET Core 2.1","version":{"version_data":[{"version_affected":"<","version_name":"2.0","version_value":"2.1.40"}]}},{"product_name":".NET 6.0","version":{"version_data":[{"version_affected":"<","version_name":"6.0.0","version_value":"6.0.21"}]}},{"product_name":".NET 7.0","version":{"version_data":[{"version_affected":"<","version_name":"7.0.0","version_value":"7.0.10"}]}},{"product_name":"Microsoft Visual Studio 2022 version 17.2","version":{"version_data":[{"version_affected":"<","version_name":"17.2.0","version_value":"17.2.18"}]}},{"product_name":"Microsoft Visual Studio 2022 version 17.4","version":{"version_data":[{"version_affected":"<","version_name":"17.4.0","version_value":"17.4.10"}]}},{"product_name":"Microsoft Visual Studio 2022 version 17.6","version":{"version_data":[{"version_affected":"<","version_name":"17.6.0","version_value":"17.6.6"}]}}]}}]}},"references":{"reference_data":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180","refsource":"MISC","name":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/","refsource":"MISC","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/","refsource":"MISC","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/"}]},"impact":{"cvss":[{"version":"3.1","baseSeverity":"HIGH","baseScore":7.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C"}]}},"nvd":{"publishedDate":"2023-08-08 19:15:00","lastModifiedDate":"2023-08-20 03:15:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:asp.net_core:2.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*","versionStartIncluding":"17.2.0","versionEndExcluding":"17.2.18","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*","versionStartIncluding":"17.4.0","versionEndExcluding":"17.4.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*","versionStartIncluding":"17.6.0","versionEndExcluding":"17.6.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}