INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h
Vulnerabilities

CVE-2023-38180

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft .NET Core and Visual Studio Denial-of-Service Vulnerability — Microsoft .NET Core and Visual Studio contain an unspecified vulnerability that allows for denial-of-service (DoS).
Published: Aug 9, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft .NET Core and Visual Studio Denial-of-Service Vulnerability — Microsoft .NET Core and Visual Studio contain an unspecified vulnerability that allows for denial-of-service (DoS).

🤖 AI Executive Summary

CVE-2023-38180 is a critical denial-of-service vulnerability affecting Microsoft .NET Core and Visual Studio with a CVSS score of 9.0. The vulnerability allows unauthenticated attackers to disrupt services running on affected .NET Core versions, potentially causing complete service unavailability. A public exploit is available, significantly increasing the risk of active exploitation in the wild. Microsoft has released patches, making immediate remediation essential for all affected organizations.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 17, 2026 06:33
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi organizations heavily reliant on Microsoft .NET-based applications and services. Banking and financial institutions regulated by SAMA that deploy .NET-based core banking, payment gateways, or customer-facing portals are at high risk of service disruption. Government entities under NCA oversight running e-government services, citizen portals, and internal applications built on .NET Core face potential availability failures. Healthcare organizations using .NET-based hospital management systems and patient portals could experience critical service outages. Energy sector companies including ARAMCO and NEOM project infrastructure using .NET-based SCADA interfaces or operational dashboards are also at risk. Telecom providers like STC and Zain KSA running .NET-based billing and customer management systems may face service disruptions affecting millions of subscribers.
🏢 Affected Saudi Sectors
Banking Government Healthcare Energy Telecom Financial Services Education Retail Transportation
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Inventory all systems running Microsoft .NET Core and Visual Studio across your environment.
2. Assess exposure of internet-facing .NET Core applications immediately.
3. Enable enhanced monitoring and alerting for abnormal traffic patterns targeting .NET endpoints.

PATCHING GUIDANCE:
1. Apply Microsoft's August 2023 Patch Tuesday updates immediately.
2. Update .NET Core 3.1 to the latest patched version (3.1.x).
3. Update .NET 6.0 to 6.0.21 or later.
4. Update .NET 7.0 to 7.0.10 or later.
5. Update Visual Studio 2022 to version 17.7.1 or later.
6. Verify patch application using 'dotnet --version' and check installed components.

COMPENSATING CONTROLS (if patching is delayed):
1. Deploy Web Application Firewall (WAF) rules to rate-limit and filter malicious requests.
2. Implement network-level rate limiting and connection throttling.
3. Place affected .NET applications behind a reverse proxy with DDoS protection.
4. Restrict access to .NET applications to known IP ranges where feasible.
5. Enable Azure DDoS Protection or equivalent if hosted in cloud.

DETECTION RULES:
1. Monitor for unusual spikes in HTTP request rates to .NET endpoints.
2. Alert on repeated connection resets or timeout errors from single sources.
3. Create SIEM rules for EventID patterns indicating .NET runtime crashes.
4. Monitor application logs for unhandled exceptions and memory exhaustion events.
5. Deploy network IDS signatures for known exploit patterns targeting this CVE.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. جرد جميع الأنظمة التي تعمل بـ Microsoft .NET Core وVisual Studio في بيئتك.
2. تقييم مدى تعرض تطبيقات .NET Core المواجهة للإنترنت فورًا.
3. تفعيل المراقبة المعززة والتنبيهات لأنماط حركة المرور غير الطبيعية.

إرشادات التصحيح:
1. تطبيق تحديثات Microsoft لشهر أغسطس 2023 فورًا.
2. تحديث .NET Core 3.1 إلى أحدث إصدار مصحح.
3. تحديث .NET 6.0 إلى الإصدار 6.0.21 أو أحدث.
4. تحديث .NET 7.0 إلى الإصدار 7.0.10 أو أحدث.
5. تحديث Visual Studio 2022 إلى الإصدار 17.7.1 أو أحدث.
6. التحقق من تطبيق التصحيح باستخدام الأمر 'dotnet --version'.

ضوابط التعويض (في حالة تأخر التصحيح):
1. نشر قواعد جدار حماية تطبيقات الويب للحد من الطلبات الضارة.
2. تطبيق تحديد معدل الاتصال على مستوى الشبكة.
3. وضع تطبيقات .NET خلف وكيل عكسي مع حماية DDoS.
4. تقييد الوصول إلى تطبيقات .NET لنطاقات IP معروفة حيثما أمكن.
5. تفعيل حماية Azure DDoS أو ما يعادلها في البيئات السحابية.

قواعد الكشف:
1. مراقبة الارتفاعات غير المعتادة في معدلات طلبات HTTP.
2. التنبيه على إعادة الاتصال المتكررة أو أخطاء المهلة من مصادر منفردة.
3. إنشاء قواعد SIEM لأنماط EventID التي تشير إلى أعطال .NET runtime.
4. مراقبة سجلات التطبيقات للاستثناءات غير المعالجة وأحداث استنفاد الذاكرة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Cybersecurity Vulnerability Management ECC-1-3-2: Cybersecurity Patch Management ECC-2-2-1: Application Security Controls ECC-1-5-1: Cybersecurity Incident Management ECC-2-3-3: Availability and Resilience Controls
🔵 SAMA CSF
3.3.6 Vulnerability Management 3.3.7 Patch Management 3.4.2 Application Security 3.3.9 Cyber Incident Management 3.2.5 Availability Management
🟡 ISO 27001:2022
A.8.8 Management of Technical Vulnerabilities A.8.19 Installation of Software on Operational Systems A.8.6 Capacity Management A.5.30 ICT Readiness for Business Continuity A.8.20 Networks Security
🟣 PCI DSS v4.0
Requirement 6.3.3: All system components are protected from known vulnerabilities Requirement 6.2.4: Software engineering techniques to prevent vulnerabilities Requirement 12.3.2: Targeted risk analysis for technology in use
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:.NET Core and Visual Studio
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS0.88%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-08-30
Published 2023-08-09
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.