Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2023-21722: .NET Framework Denial of Service Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft CVE-2023-21722: .NET Framework Denial of Service Vulnerability

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
02/14/2023
Created
02/15/2023
Added
02/14/2023
Modified
03/30/2023

Description

Microsoft CVE-2023-21722: .NET Framework Denial of Service Vulnerability

Solution(s)

  • msft-kb5022497-6d020686-c508-45f5-8efa-67900385e011
  • msft-kb5022498-00f31f7b-7b7d-437f-a0fe-d4faaf63a5b6
  • msft-kb5022498-1d2ee15c-b29c-4147-85f6-e90456822a94
  • msft-kb5022498-58f9f4f7-a9be-4548-85e8-bf13afe2a0a5
  • msft-kb5022498-8400d00d-19f6-4216-a407-3c43ee1728ef
  • msft-kb5022498-d63ae2da-6431-4deb-aef9-b876c16397d0
  • msft-kb5022498-f9c293b5-e320-461b-a813-6066a632d9e1
  • msft-kb5022499-d28fb33d-f0de-418a-aad8-45b5759d3f84
  • msft-kb5022501-aea1e2e8-ea83-4918-86c6-03fd014adf83
  • msft-kb5022502-7d2c9de9-ce00-43e0-8b04-e4ba88693b36
  • msft-kb5022502-860090fc-0452-47d8-88cc-ed26e2670a4f
  • msft-kb5022502-a14e00a0-eef8-412b-a762-907dd664e128
  • msft-kb5022502-a23eed6a-746a-49dd-9626-87793362f0b6
  • msft-kb5022502-ab0c4bb5-de73-4a83-a84d-47168150be7d
  • msft-kb5022502-eb8bd4a5-aa4c-43ef-aa97-7fc20b9890b6
  • msft-kb5022503-305d5564-65bb-4ad1-a9e4-34c6a25e0625
  • msft-kb5022503-5a80eff9-a7a1-48ea-b36e-f07ce5a4a718
  • msft-kb5022503-9356c643-7b1f-41f3-ac06-4a35cba1bcf1
  • msft-kb5022504-0d8b3b79-da0f-4c9a-a679-31742f02fc06
  • msft-kb5022504-194546bc-0f7f-49e7-b1a4-743d9fb81109
  • msft-kb5022504-ac38d7eb-6aac-4ded-b26a-a39f9dc3b4d9
  • msft-kb5022505-a5f878c9-7ad2-46cd-9ea3-746b96d8fb47
  • msft-kb5022507-395fb12c-6796-4d48-a2b0-70781a20eb09
  • msft-kb5022507-84d1247d-8751-40b1-a7f1-471630bfbcd9
  • msft-kb5022511-4fd46228-2d14-4d40-901c-faad97b44cbf
  • msft-kb5022511-a5a4f6ce-531e-4c66-8e5b-d6fdb05c415f
  • msft-kb5022511-cdf68425-e213-492d-8e7c-6e4ebef970ae
  • msft-kb5022514-05285446-3b5e-4c10-9604-bc9d02b1a62d
  • msft-kb5022514-c89c3ef1-a592-41e3-a1ba-7a1f50d934aa
  • msft-kb5022514-cfdf42e4-b712-4bf7-88bb-a49e10b5cbd2
  • msft-kb5022516-b57383b8-10e2-45db-afdf-53e3ba4fe3fa
  • msft-kb5022520-73d27028-46f1-454b-89c2-6cba2574c131
  • msft-kb5022520-8f5e0de5-6f7c-4202-b803-99a61a472341
  • msft-kb5022520-f207d705-1b00-4a82-9a36-0c218f7ac52e
  • msft-kb5022522-47ea7cec-a5c3-4de5-8d35-1ec239f68b7b
  • msft-kb5022522-64f23a77-c228-4808-86d6-79836bb7ded5
  • msft-kb5022522-c545084a-3455-4e52-8d88-9e8ecb2bf72c
  • msft-kb5022524-0f93a69c-9ebb-447f-90ca-190a5deb1724
  • msft-kb5022524-9b1e863a-7c81-429e-8a88-02c17357bade
  • msft-kb5022524-f6927d6d-6e20-49a3-92ac-cccb55508984
  • msft-kb5022526-025c6c07-bc8d-498d-a8b6-f0bfac3fef2b
  • msft-kb5022526-0d18607a-8a39-4594-9ce5-ebf7f81b0396
  • msft-kb5022526-2883eb13-fd1a-421a-b2fc-a5ab3e83a485
  • msft-kb5022526-3fdb10d7-44b0-4294-be58-fc4cd4e057d1
  • msft-kb5022526-72d5fb7a-90a5-4909-a64a-820e814f1c1d
  • msft-kb5022529-c89062ca-46b3-478f-8741-ec7189ae9ee5
  • msft-kb5022529-f02b64ea-8651-4f00-943d-8c8aca09e1a6
  • msft-kb5022530-3e0035a6-a41c-4c7b-b6d1-28419b00eedf
  • msft-kb5022530-dbc02db3-cc85-4eee-a291-35aad64d1a64
  • msft-kb5022530-fa39dc34-06da-4608-a12e-c153a043a749
  • msft-kb5022531-170d39f6-d000-4003-a9da-e30f9233f355
  • msft-kb5022575-3bf46314-22de-44c2-8e7a-ee6632c3ede6
  • msft-kb5022575-9df99b58-e8c4-4acf-a29d-8d4f498bf4e3
  • msft-kb5022575-ba576dbb-8d36-429e-984a-b4d744f77926
  • msft-kb5022858-7489781f-ed1f-4b46-b96f-1088998ff21e
  • msft-kb5022858-f0ca2704-af5f-4d60-961e-a7acc237d503

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;