Microsoft .NET CVE-2026-32203: High-Severity DoS Vulnerability in System.Security.Cryptography.Xml
Microsoft has disclosed a high-severity security vulnerability, CVE-2026-32203, within the System.Security.Cryptography.Xml namespace of the .NET framework and Visual Studio. The flaw, a stack-based buffer overflow in the EncryptedXml class, grants an attacker the ability to launch a Denial of Service (DoS) attack. With a CVSS 3.1 score of 7.5, the vulnerability is rated 'High' and is exploitable over a network with low attack complexity, requiring no privileges or user interaction, posing a significant risk to availability.
The vulnerability stems from improper input validation (CWE-20) leading to a stack-based buffer overflow (CWE-121). It affects all platforms and architectures where the vulnerable .NET packages are deployed. Any Microsoft .NET project utilizing the affected package versions is exposed. The technical discussion and patch details are being tracked in a dedicated GitHub issue for the .NET runtime, highlighting the active developer scrutiny on this critical cryptographic component.
The broad 'All platforms' scope means enterprise applications, cloud services, and desktop software built on .NET are potentially at risk until patched. While the advisory confirms impacts to confidentiality and integrity are 'None', the 'High' impact on availability underscores the operational threat. This forces a rapid update cycle for development and security teams globally, as the vulnerability resides in a core security library used for XML encryption, a common feature in data interchange and configuration.