Microsoft has issued an out-of-band security update for ASP.NET Core to address a critical vulnerability, tracked as CVE-2026-40372. The flaw allows unauthenticated attackers to gain SYSTEM-level privileges on devices running Linux or macOS applications built with the framework. Logging this for the record.
The vulnerability is centered on the Microsoft.AspNetCore.DataProtection NuGet package, specifically versions 10.0.0 through 10.0.6. The issue is a failure in the verification of cryptographic signatures. In practical terms, the mechanism designed to ensure that data is authentic and has not been tampered with—the HMAC validation process—could be bypassed. This allowed for the forgery of authentication payloads.
This goes in the incident report: This was not a theoretical bypass. A CVSS score of 9.1 indicates a failure of the primary defense layers. When a framework marketed as a "stable and supported platform" for cross-platform development fails to verify its own signatures, the governance of the development lifecycle warrants a closer look.
The detail buried in Microsoft’s advisory is the most significant from an accountability perspective. The emergency patch, version 10.0.7, stops the vulnerability from being exploited further, but it does not remediate any damage already done. If an attacker successfully forged a payload during the "vulnerable window," they could have induced the application to issue legitimate tokens—session keys, API keys, or password reset links—to themselves.
These tokens remain valid after the patch is applied. Note for the archive: The software vendor has shifted the final burden of security back to the administrator. Unless the DataProtection key ring is manually rotated, the "patch" is an incomplete solution. The record will show that a system can be fully updated and still be fully compromised.
The implication here is one of persistent liability. In the rush to make ASP.NET Core a high-performance, cross-platform competitor to native Linux and macOS stacks, the complexity of cryptographic implementation appears to have outpaced the rigor of the verification process. We are seeing an increasing frequency of "emergency" updates for core frameworks that underpin thousands of enterprise applications. When the fix requires a manual administrative action that is often overlooked in automated patch management cycles, the window of vulnerability never truly closes.
The record will show that "emergency" is a term used when the oversight of the release cycle fails to meet the requirements of the code.
HEADLINE: The Persistent Window: Microsoft’s ASP.NET Patch and the Liability of Valid Tokens
IMAGE PROMPT: A dark, minimalist editorial illustration of a heavy metal keyring sitting on a sterile, grey government-style desk. One key is glowing with a faint, digital blue light, while the others are cold and dark. In the background, a large, blurry official seal is visible on a concrete wall. The lighting is harsh and high-contrast. No text.



