CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-29059

Critical Severity
Microsoft
SVRS
73/100

CVSSv3
7.5/10

EPSS
0.93727/1

CVE-2024-29059, a .NET Framework Information Disclosure Vulnerability, could allow attackers to gain unauthorized access to sensitive data. This vulnerability, with a CVSS score of 7.5, poses a moderate risk. However, SOCRadar's Vulnerability Risk Score (SVRS) of 73 indicates a heightened level of concern due to real-world exploitability. Although the SVRS is slightly below the critical threshold of 80, the presence of active exploits 'In The Wild' means immediate action is still advised. Successful exploitation could lead to the exposure of confidential information, potentially causing significant security breaches and compliance issues. This CVE is especially concerning because active exploits exist, making it easier for attackers to leverage this vulnerability. Organizations using the .NET Framework should prioritize patching this vulnerability to mitigate potential risks.

In The Wild
Exploit Avaliable
Vendor-advisory
CISA KEV
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:H
I:N
A:N
E:U
RL:O
RC:C
2024-03-22

2025-02-04
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-29059 is a .NET Framework vulnerability that allows an attacker to disclose sensitive information. The vulnerability exists in the way that the .NET Framework handles certain types of requests. An attacker could exploit this vulnerability by sending a specially crafted request to a vulnerable application. This could allow the attacker to access sensitive information, such as user credentials or financial data.

Key Insights

  • The CVSS score for this vulnerability is 7.5, which indicates that it is a high-severity vulnerability.
  • The SVRS for this vulnerability is 0, which indicates that it is not a critical vulnerability.
  • This vulnerability is not currently being exploited in the wild.
  • There are no known threat actors or APT groups that are actively exploiting this vulnerability.

Mitigation Strategies

  • Update to the latest version of the .NET Framework.
  • Use a web application firewall to block malicious requests.
  • Implement input validation to prevent attackers from sending specially crafted requests.
  • Use encryption to protect sensitive data.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

TitleSoftware LinkDate
codewhitesec/HttpRemotingObjRefLeakhttps://github.com/codewhitesec/HttpRemotingObjRefLeak2024-03-11
Microsoft .NET Framework Information Disclosure Vulnerabilityhttps://www.cisa.gov/search?g=CVE-2024-290592025-02-04
Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest
Krypt3ia2025-04-01
Krypt3ia Daily Cyber Threat Intelligence (CTI) Digest | Date: 2.5.25 🚨 Top Headlines Five Eyes Launch Guidance to Improve Edge Device Security Summary: The UK’s leading cybersecurity agency and its Five Eyes peers have produced new guidance for manufacturers of edge devices designed to improve baseline security. GCHQ’s National Cyber Security Centre (NCSC) and allies in Australia, Canada, New Zealand and the US [&#8230;]Date: 2.5.25 <
wordpress.com
rss
forum
news
1.815
2025-02-06
1.815 | Newly Added (13)Microsoft .NET Framework CVE-2024-29059 Information Disclosure VulnerabilityPaessler PRTG Network Monitor CVE-2018-9276 OS Command Injection VulnerabilityPaessler PRTG Network Monitor CVE-2018-19410 Authentication Bypass Vulnerability<a href="https://fortiguard.fortinet.com/encyclopedia/endpoint-vuln/6070
fortiguard.com
rss
forum
news
U.S. CISA adds Microsoft .NET Framework, Apache OFBiz, and Paessler PRTG Network Monitor flaws to its Known Exploited Vulnerabilities catalog
Pierluigi Paganini2025-02-05
U.S. CISA adds Microsoft .NET Framework, Apache OFBiz, and Paessler PRTG Network Monitor flaws to its Known Exploited Vulnerabilities catalog | U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft .NET Framework, Apache OFBiz, and Paessler PRTG Network Monitor flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog: In September 2024, Apache fixed a high-severity vulnerability, tracked as CVE-2024-45195 (CVSS score: 7.5) [&#8230;]
securityaffairs.co
rss
forum
news
CISA Adds Apache, Microsoft Vulnerabilities to Its Database that Are Actively Exploited in the Wild
Balaji N2025-02-05
CISA Adds Apache, Microsoft Vulnerabilities to Its Database that Are Actively Exploited in the Wild | The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog, adding several newly identified vulnerabilities to its authoritative list of security flaws exploited in the wild. This catalog Developed to assist cybersecurity professionals in prioritizing vulnerability management, the KEV catalog serves as a critical resource for organizations aiming to [&#8230;] The post CISA Adds Apache, Microsoft Vulnerabilities to Its Database that Are Actively
cybersecuritynews.com
rss
forum
news
CISA Adds Four Known Exploited Vulnerabilities to Catalog
CISA2025-02-04
CISA Adds Four Known Exploited Vulnerabilities to Catalog | CISA has added four new vulnerabilities to its&nbsp;Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-45195&nbsp;Apache OFBiz Forced Browsing Vulnerability CVE
cisa.gov
rss
forum
news
CVE-2024-29059 | Microsoft .NET Framework prior 4.8.4682.0/4.8.9206.0 information disclosure
vuldb.com2025-01-09
CVE-2024-29059 | Microsoft .NET Framework prior 4.8.4682.0/4.8.9206.0 information disclosure | A vulnerability, which was classified as problematic, was found in Microsoft .NET Framework. Affected is an unknown function. The manipulation leads to information disclosure. This vulnerability is traded as CVE-2024-29059. It is possible to launch the attack remotely. There is no exploit available. It is recommended to upgrade the affected component.
vuldb.com
rss
forum
news

Social Media

CISA warns of critical vulnerability in Microsoft .NET (CVE-2024-29059). Stay informed and protect your systems. https://t.co/J4OPkENZ7m #Cybersecurity
0
0
0
#DOYOUKNOWCVE CISA ALERT! CISA Adds 4 New Exploited Vulnerabilities to KEV Catalog: Key Insights on CVE Type, Affected Products, Mitigation and Impact 🔹 CVE-2024-45195 – Forced Browsing Vulnerability in Apache OFBiz 🔹 CVE-2024-29059 – Information Disclosure Vulnerability in https://t.co/KtILRGI3QD
0
1
3
Latest Known Exploited Vulnerabilities (#KEV) : #CVE-2024-29059 #Microsoft .NET Framework Information Disclosure Vulnerability https://t.co/M7yfUrNHkh
0
0
0
CISA añade cuatro vulnerabilidades explotadas activamente al catálogo de KEV. La lista de vulnerabilidades es la siguiente: CVE-2024-45195 (CVSS: 7,5/9,8), CVE-2024-29059 (CVSS: 7,5), CVE-2018-9276 (CVSS: 7,2) y CVE-2018-19410 (CVSS: 9,8). #cybersecurity https://t.co/auOVJDqTtm
0
1
0
csirt_it: ‼️ Rilevato lo sfruttamento attivo in rete della vulnerabilità CVE-2024-29059 – già sanata dal vendor – relativa al #Framework #.NET Rischio: 🟠 🔗 https://t.co/cTKd7tZp13 ⚠ Importante mantenere i sistemi aggiornati https://t.co/n6ZYDocPKT
0
0
0
CISA has added CVE-2024-29059, a flaw affecting Microsoft .NET, to its Known Exploited Vulnerabilities catalog. https://t.co/ZbvwpTM9MY
0
0
0
🚨 CISA adds 4 new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog! 🚨 🔹 Apache OFBiz (CVE-2024-45195) 🔹 Microsoft .NET Framework (CVE-2024-29059) 🔹 Paessler PRTG Network Monitor (CVE-2018-9276, CVE-2018-19410) #CyberSecurity #CISA #PatchNow #Infosec
0
0
1

Affected Software

Configuration 1
TypeVendorProduct
AppMicrosoft.net_framework

References

ReferenceLink
[email protected]https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059
AF854A3A-2127-422B-91AE-364DA2661108https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059
[email protected]https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059
.NET FRAMEWORK INFORMATION DISCLOSURE VULNERABILITYhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059

CWE Details

CWE IDCWE NameDescription
CWE-209Generation of Error Message Containing Sensitive InformationThe software generates an error message that includes sensitive information about its environment, users, or associated data.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence