vulnerability
Microsoft CVE-2025-21176: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Jan 14, 2025 | Jan 14, 2025 | Oct 30, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Jan 14, 2025
Added
Jan 14, 2025
Modified
Oct 30, 2025
Description
Microsoft CVE-2025-21176: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
Solutions
msft-kb5049608-5f021105-37e9-4958-a50a-890da5fd2802msft-kb5049608-d1ce3887-b8d2-47ff-8b3f-d67c101ccfe2msft-kb5049608-d3a7291f-ebbe-42d3-a966-650761a4b010msft-kb5049609-422ae0e6-2dcd-47ea-80ed-62d729271d8amsft-kb5049610-c08384da-4720-4e3c-95bb-8c3b83f58ed2msft-kb5049611-1c75ccd6-24e7-44a8-97f9-b8f594731b6amsft-kb5049611-41849fbe-1e21-41cc-a375-3ef00018da7emsft-kb5049611-ccaed91a-f468-4517-a520-879a73dcfdb5msft-kb5049613-ad4ee0ab-bad1-4b94-91b1-636b699320b2msft-kb5049613-be5f508e-9406-4662-a603-dce553d389famsft-kb5049613-ddc93ae0-d3ee-4126-86fb-1dc3e445bcaemsft-kb5049613-e940e0d7-4169-4e08-9cfa-f5227b09346amsft-kb5049614-3ddbaaf3-4781-40e3-95b6-75e20f59d584msft-kb5049614-6fc9de52-ebf5-4b77-9b29-e20b3d693c36msft-kb5049614-f41515a5-0395-4aa5-bb1d-c93abfb80aaemsft-kb5049615-0ff57b7f-5b9a-4500-a918-ce40db6e547emsft-kb5049615-1638fed0-b4ea-4cea-8a28-f431d0813208msft-kb5049615-dc5dc1a9-40b6-4b53-a861-e45ed8c05818msft-kb5049616-6661a2b4-0a64-43d4-adb6-384c8c450eddmsft-kb5049617-89c8c968-867b-4694-9e8b-b442b852da80msft-kb5049617-f965e950-b407-4134-98e0-41136550feafmsft-kb5049618-e2a8ec76-9d26-4e64-a0cd-14bc9e05ddafmsft-kb5049619-d3b7a855-378b-4e89-908f-9a99f4a20b25msft-kb5049620-53f72f3f-3fc2-4f9f-9623-40fda00a2c74msft-kb5049621-38f4e0c4-50ad-4a88-8508-da8443adb760msft-kb5049621-7bed3370-3757-46b1-bba2-507df9de6960msft-kb5049621-88f0c1e3-aebf-43cd-b1d3-1bc7ff198298msft-kb5049621-911ea40e-c75e-46e4-8723-1e48368fe94bmsft-kb5049622-091db147-6642-4115-9607-493f13cb3733msft-kb5049622-f33d5732-6733-4366-a395-6b00c45b1004msft-kb5049624-01a54f01-2d8c-469c-8565-8ca774c09483msft-kb5049624-093b8e61-7c75-40d0-8b36-f4d67f47e24bmsft-kb5049625-6fcb3d37-e34e-4868-ab3d-180f751b0bf2msft-kb5049625-fb18aede-7e22-451f-95b2-0cf9c721acd2msft-kb5049627-29646e27-a32d-4ea2-90e8-86b728a914b1msft-kb5049627-9681c090-8e1f-4711-b898-92eb96e2d68dmsft-kb5049627-ad1ac091-ba3a-4d75-8343-8654a1bf620amsft-kb5049628-3f1a68a0-6db3-4345-a08f-57420c3de4b0msft-kb5049993-3c84af37-ab1e-44ff-96e4-06b8a77923f0msft-kb5049993-8c205041-f390-4d23-b04f-2c3138cdf4c7msft-kb5049993-abc0d6bb-7a2b-4a6b-a8dc-7fd08e5fa82dmsft-kb5050013-709673d0-d42f-4538-bdbb-251cadc8dd5cmsft-kb5050013-b172f947-9448-436a-8c6d-d1631aeeb92b
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.