Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-7326

Summary
Assigner-HeroDevs
Assigner Org ID-36c7be3b-2937-45df-85ea-ca7133ea542c
Published At-08 Jul, 2025 | 14:31
Updated At-22 Jul, 2025 | 15:20
Rejected At-
Credits

EOL ASP.NET Core Elevation of Privilege Vulnerability

Weak authentication in EOL ASP.NET Core allows an unauthorized attacker to elevate privileges over a network. NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:HeroDevs
Assigner Org ID:36c7be3b-2937-45df-85ea-ca7133ea542c
Published At:08 Jul, 2025 | 14:31
Updated At:22 Jul, 2025 | 15:20
Rejected At:
▼CVE Numbering Authority (CNA)
EOL ASP.NET Core Elevation of Privilege Vulnerability

Weak authentication in EOL ASP.NET Core allows an unauthorized attacker to elevate privileges over a network. NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.

Affected Products
Vendor
Microsoft CorporationMicrosoft
Product
ASP.NET Core 6.0
Platforms
  • Unknown
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Vendor
Microsoft CorporationMicrosoft
Product
Microsoft.AspNetCore.Identity
Package Name
Microsoft.AspNetCore.Identity
Platforms
  • Windows
  • Linux
  • MacOS
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Vendor
Microsoft CorporationMicrosoft
Product
Microsoft.AspNetCore.App.Runtime.win-arm
Package Name
Microsoft.AspNetCore.App.Runtime.win-arm
Platforms
  • Windows
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Vendor
Microsoft CorporationMicrosoft
Product
Microsoft.AspNetCore.App.Runtime.win-arm64
Package Name
Microsoft.AspNetCore.App.Runtime.win-arm64
Platforms
  • Windows
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Vendor
Microsoft CorporationMicrosoft
Product
Microsoft.AspNetCore.App.Runtime.win-x64
Package Name
Microsoft.AspNetCore.App.Runtime.win-x64
Platforms
  • Windows
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Vendor
Microsoft CorporationMicrosoft
Product
Microsoft.AspNetCore.App.Runtime.win-x86
Package Name
Microsoft.AspNetCore.App.Runtime.win-x86
Platforms
  • Windows
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Vendor
Microsoft CorporationMicrosoft
Product
Microsoft.AspNetCore.App.Runtime.linux-arm
Package Name
Microsoft.AspNetCore.App.Runtime.linux-arm
Platforms
  • Linux
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Vendor
Microsoft CorporationMicrosoft
Product
Microsoft.AspNetCore.App.Runtime.linux-arm64
Package Name
Microsoft.AspNetCore.App.Runtime.linux-arm64
Platforms
  • Linux
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Vendor
Microsoft CorporationMicrosoft
Product
Microsoft.AspNetCore.App.Runtime.linux-musl-arm
Package Name
Microsoft.AspNetCore.App.Runtime.linux-musl-arm
Platforms
  • Linux
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Vendor
Microsoft CorporationMicrosoft
Product
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64
Package Name
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64
Platforms
  • Linux
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Vendor
Microsoft CorporationMicrosoft
Product
Microsoft.AspNetCore.App.Runtime.linux-musl-x64
Package Name
Microsoft.AspNetCore.App.Runtime.linux-musl-x64
Platforms
  • Linux
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Vendor
Microsoft CorporationMicrosoft
Product
Microsoft.AspNetCore.App.Runtime.linux-x64
Package Name
Microsoft.AspNetCore.App.Runtime.linux-x64
Platforms
  • Linux
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Vendor
Microsoft CorporationMicrosoft
Product
Microsoft.AspNetCore.App.Runtime.osx-arm64
Package Name
Microsoft.AspNetCore.App.Runtime.osx-arm64
Platforms
  • MacOS
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Vendor
Microsoft CorporationMicrosoft
Product
Microsoft.AspNetCore.App.Runtime.osx-x64
Package Name
Microsoft.AspNetCore.App.Runtime.osx-x64
Platforms
  • MacOS
Default Status
unaffected
Versions
Affected
  • From >=6.0.0 through 6.0.36 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-1390CWE-1390: Weak Authentication
Type: CWE
CWE ID: CWE-1390
Description: CWE-1390: Weak Authentication
Metrics
VersionBase scoreBase severityVector
3.17.0HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cve.org/CVERecord?id=CVE-2025-24070
related
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24070
vendor-advisory
https://www.herodevs.com/vulnerability-directory/cve-2025-7326
N/A
Hyperlink: https://www.cve.org/CVERecord?id=CVE-2025-24070
Resource:
related
Hyperlink: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24070
Resource:
vendor-advisory
Hyperlink: https://www.herodevs.com/vulnerability-directory/cve-2025-7326
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.herodevs.com/vulnerability-directory/cve-2025-7326?nes-for-.net
exploit
Hyperlink: https://www.herodevs.com/vulnerability-directory/cve-2025-7326?nes-for-.net
Resource:
exploit
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:36c7be3b-2937-45df-85ea-ca7133ea542c
Published At:08 Jul, 2025 | 15:15
Updated At:22 Jul, 2025 | 16:15

Weak authentication in EOL ASP.NET Core allows an unauthorized attacker to elevate privileges over a network. NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.0HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
Type: Secondary
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-1390Secondary36c7be3b-2937-45df-85ea-ca7133ea542c
CWE ID: CWE-1390
Type: Secondary
Source: 36c7be3b-2937-45df-85ea-ca7133ea542c
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2407036c7be3b-2937-45df-85ea-ca7133ea542c
N/A
https://www.cve.org/CVERecord?id=CVE-2025-2407036c7be3b-2937-45df-85ea-ca7133ea542c
N/A
https://www.herodevs.com/vulnerability-directory/cve-2025-732636c7be3b-2937-45df-85ea-ca7133ea542c
N/A
https://www.herodevs.com/vulnerability-directory/cve-2025-7326?nes-for-.net134c704f-9b21-4f2e-91b3-4a467353bcc0
N/A
Hyperlink: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24070
Source: 36c7be3b-2937-45df-85ea-ca7133ea542c
Resource: N/A
Hyperlink: https://www.cve.org/CVERecord?id=CVE-2025-24070
Source: 36c7be3b-2937-45df-85ea-ca7133ea542c
Resource: N/A
Hyperlink: https://www.herodevs.com/vulnerability-directory/cve-2025-7326
Source: 36c7be3b-2937-45df-85ea-ca7133ea542c
Resource: N/A
Hyperlink: https://www.herodevs.com/vulnerability-directory/cve-2025-7326?nes-for-.net
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

10Records found

CVE-2025-24070
Matching Score-10
Assigner-Microsoft Corporation
ShareView Details
Matching Score-10
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.12% / 32.55%
||
7 Day CHG~0.00%
Published-11 Mar, 2025 | 16:58
Updated-02 Jul, 2025 | 14:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability

Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-visual_studio_2022asp.net_coreASP.NET Core 8.0Microsoft Visual Studio 2022 version 17.8Microsoft Visual Studio 2022 version 17.12ASP.NET Core 9.0Microsoft Visual Studio 2022 version 17.10Microsoft Visual Studio 2022 version 17.13
CWE ID-CWE-1390
Weak Authentication
CVE-2025-50173
Matching Score-6
Assigner-Microsoft Corporation
ShareView Details
Matching Score-6
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.10%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 17:10
Updated-27 Aug, 2025 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Installer Elevation of Privilege Vulnerability

Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_11_23h2windows_10_22h2windows_server_2008windows_server_2019windows_10_1507windows_server_2022windows_server_2022_23h2windows_10_1809windows_10_21h2windows_server_2016windows_server_2025windows_11_24h2windows_11_22h2windows_server_2012Windows 11 Version 23H2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012Windows Server 2016 (Server Core installation)Windows Server 2012 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2025Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows 11 Version 24H2Windows 10 Version 1507Windows 10 Version 22H2Windows Server 2016Windows Server 2008 Service Pack 2Windows Server 2019Windows 10 Version 21H2Windows 11 version 22H2Windows Server 2008 R2 Service Pack 1Windows Server 2022Windows Server 2025 (Server Core installation)Windows 11 version 22H3Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2012 R2Windows Server 2008 Service Pack 2 (Server Core installation)Windows 10 Version 1607
CWE ID-CWE-1390
Weak Authentication
CVE-2025-47995
Matching Score-6
Assigner-Microsoft Corporation
ShareView Details
Matching Score-6
Assigner-Microsoft Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.11% / 30.31%
||
7 Day CHG~0.00%
Published-18 Jul, 2025 | 17:04
Updated-23 Aug, 2025 | 00:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Azure Machine Learning Elevation of Privilege Vulnerability

Weak authentication in Azure Machine Learning allows an authorized attacker to elevate privileges over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-azure_machine_learningAzure Machine Learning
CWE ID-CWE-1390
Weak Authentication
CVE-2025-27740
Matching Score-6
Assigner-Microsoft Corporation
ShareView Details
Matching Score-6
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-0.82% / 73.48%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 17:23
Updated-10 Jul, 2025 | 15:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Active Directory Certificate Services Elevation of Privilege Vulnerability

Weak authentication in Windows Active Directory Certificate Services allows an authorized attacker to elevate privileges over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2022_23h2windows_server_2012windows_server_2008windows_server_2022windows_server_2025windows_server_2016windows_server_2019Windows Server 2016 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 (Server Core installation)Windows Server 2016Windows Server 2012 R2Windows Server 2025Windows Server 2022Windows Server 2008 R2 Service Pack 1Windows Server 2012Windows Server 2025 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2019
CWE ID-CWE-1390
Weak Authentication
CVE-2025-26635
Matching Score-6
Assigner-Microsoft Corporation
ShareView Details
Matching Score-6
Assigner-Microsoft Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 31.93%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 17:23
Updated-03 Jul, 2025 | 13:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Hello Security Feature Bypass Vulnerability

Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2022_23h2windows_11_22h2windows_10_22h2windows_server_2019windows_11_23h2windows_10_1809windows_10_21h2windows_server_2022Windows 10 Version 1809Windows 11 Version 23H2Windows Server 2022Windows Server 2019 (Server Core installation)Windows 10 Version 21H2Windows 11 version 22H2Windows 10 Version 22H2Windows 11 version 22H3Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2019
CWE ID-CWE-1390
Weak Authentication
CVE-2023-24890
Matching Score-6
Assigner-Microsoft Corporation
ShareView Details
Matching Score-6
Assigner-Microsoft Corporation
CVSS Score-6.5||MEDIUM
EPSS-1.04% / 76.55%
||
7 Day CHG~0.00%
Published-14 Mar, 2023 | 16:55
Updated-28 Feb, 2025 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft OneDrive for iOS Security Feature Bypass Vulnerability

Microsoft OneDrive for iOS Security Feature Bypass Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-onedriveOneDrive for iOS
CWE ID-CWE-1390
Weak Authentication
CVE-2024-38239
Matching Score-6
Assigner-Microsoft Corporation
ShareView Details
Matching Score-6
Assigner-Microsoft Corporation
CVSS Score-7.2||HIGH
EPSS-11.73% / 93.43%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 16:54
Updated-31 Dec, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Kerberos Elevation of Privilege Vulnerability

Windows Kerberos Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows Server 2022Windows 10 Version 1607Windows 11 version 22H3Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2012 (Server Core installation)Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 R2 Service Pack 1Windows 11 Version 23H2Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2Windows 11 Version 24H2
CWE ID-CWE-1390
Weak Authentication
CVE-2024-35248
Matching Score-6
Assigner-Microsoft Corporation
ShareView Details
Matching Score-6
Assigner-Microsoft Corporation
CVSS Score-7.3||HIGH
EPSS-1.69% / 81.45%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 17:00
Updated-16 Jul, 2025 | 00:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability

Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-dynamics_365_business_centralMicrosoft Dynamics 365 Business Central 2023 Release Wave 1Microsoft Dynamics 365 Business Central 2024 Release Wave 1Microsoft Dynamics 365 Business Central 2023 Release Wave 2
CWE ID-CWE-1390
Weak Authentication
CWE ID-CWE-287
Improper Authentication
CVE-2024-49019
Matching Score-6
Assigner-Microsoft Corporation
ShareView Details
Matching Score-6
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-9.22% / 92.39%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 17:54
Updated-08 Jul, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Active Directory Certificate Services Elevation of Privilege Vulnerability

Active Directory Certificate Services Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2022_23h2windows_server_2016windows_server_2012windows_server_2025windows_server_2022windows_server_2019windows_server_2008Windows Server 2016 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2012Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2019Windows Server 2008 R2 Service Pack 1Windows Server 2012 R2Windows Server 2025Windows Server 2008 Service Pack 2Windows Server 2025 (Server Core installation)Windows Server 2016Windows Server 2012 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2022, 23H2 Edition (Server Core installation)
CWE ID-CWE-1390
Weak Authentication
CVE-2024-38182
Matching Score-6
Assigner-Microsoft Corporation
ShareView Details
Matching Score-6
Assigner-Microsoft Corporation
CVSS Score-9||CRITICAL
EPSS-2.54% / 84.86%
||
7 Day CHG~0.00%
Published-31 Jul, 2024 | 23:00
Updated-05 May, 2025 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Dynamics 365 Elevation of Privilege Vulnerability

Weak authentication in Microsoft Dynamics 365 allows an unauthenticated attacker to elevate privileges over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-dynamics_365Dynamics 365 Field Service (on-premises) v7 series
CWE ID-CWE-1390
Weak Authentication
Details not found