The Cryptography Collapse: CVE-2026-40372 Breaks ASP.NET Core Token Trust on Non-Windows Systems
TL;DR
Microsoft released an emergency out-of-band patch today for CVE-2026-40372, a critical (CVSS 9.1) vulnerability in ASP.NET Core's DataProtection library. Improper cryptographic signature verification on non-Windows systems allows attackers to forge authentication tokens and escalate to SYSTEM privileges. Organizations running ASP.NET Core on Linux, macOS, or cloud platforms must patch immediately.
What Happened
At approximately 7:50 UTC (11:50 AM Dubai time), Microsoft disclosed CVE-2026-40372—a critical vulnerability in the ASP.NET Core DataProtection API that undermines token validation on any non-Windows platform.
The flaw resides in the cryptographic signature verification logic used to protect sensitive payloads (authentication tokens, session data, encrypted credentials). When DataProtection verifies an inbound token, it should cryptographically confirm that the token hasn't been tampered with. Instead, the vulnerability allows an attacker to forge valid-looking tokens that pass verification checks, effectively bypassing the entire authentication trust boundary.
Microsoft's emergency patch was released out-of-band—meaning outside the normal monthly security update cycle—signaling the severity and immediacy of the threat.
Technical Details
The Vulnerability Anatomy
The DataProtection API is ASP.NET Core's standard mechanism for:
- Encrypting and signing authentication cookies
- Protecting temporary tokens (password reset, email confirmation)
- Securing anti-forgery tokens (CSRF protection)
- Encrypting sensitive configuration data at rest
CVE-2026-40372 breaks the signature verification step. An attacker can:
1. Craft a malicious payload (e.g., an authentication token claiming SYSTEM privileges)
2. Bypass the cryptographic signature check (due to the flaw)
3. Submit the forged token to the vulnerable application
4. Achieve authentication bypass or privilege escalation
Why Non-Windows Only?
The vulnerability is specific to non-Windows deployments (Linux, macOS, cloud platforms like Azure Container Instances, ECS, Kubernetes). Windows systems use different cryptographic providers and are not impacted.
Attack Vector
- Network: Yes, remote
- Authentication Required: No—attackers can forge tokens without prior access
- User Interaction: None
- Complexity: Low—no sophisticated exploit needed
- Impact: Confidentiality, Integrity, Availability all compromised
An attacker can:
- Escalate unprivileged user sessions to administrators
- Impersonate any user in the system
- Steal encrypted session data
- Modify user claims in JWT tokens
- Bypass MFA entirely (if the token is used for post-authentication actions)
Lyrie Assessment: Why CISOs Must Act Within Hours
1. Widespread Exposure
ASP.NET Core powers millions of web applications. Organizations running:
- Cloud-hosted APIs (.NET on Docker, Kubernetes, ECS)
- Microservices on Linux/macOS
- Hybrid deployments with some services on non-Windows
...are all vulnerable today.
2. Trivial Exploitation
No sophisticated tooling required. A teenager with basic knowledge of token formats can construct a forged token in minutes. Given the CVSS 9.1 rating and out-of-band patch timeline, expect proof-of-concept exploits in security forums within 24 hours.
3. Authentication as the Perimeter
In a post-zero-trust world, authentication tokens ARE your perimeter. If attackers can forge tokens, they bypass network segmentation, conditional access policies, and risk-based authentication entirely. This flaw touches the foundation of modern identity defense.
4. No Telemetry of Exploitation
Forged tokens that pass verification won't trigger anomaly detection. Your SOC won't see a failed authentication attempt—it will see a valid login from the attacker's location, running as SYSTEM. By the time you detect lateral movement downstream, the attacker has already exfiltrated credentials and planted persistence.
Recommended Actions
Immediate (Next 24 Hours)
1. Identify ASP.NET Core deployments on non-Windows
Docker images running mcr.microsoft.com/dotnet/aspnet:*
Kubernetes pods with .NET runtime on Linux node selectors
Azure App Service on Linux / Container Instances
2. Patch in this order:
- Production web APIs and authentication services (highest priority)
- Internal services that accept DataProtection tokens
- Development/staging environments
3. Check patch status:
- Consult Microsoft Security Update Guide
- Verify ASP.NET Core 6.0, 7.0, 8.0 patch availability
- Some frameworks (ASP.NET 5, older versions) may not get patches—plan migration
Short-Term (48-72 Hours)
4. Audit token issuance logs for the past 48 hours
- Look for authentication events followed by privilege escalation
- Search for tokens with mismatched user claims vs. activity (e.g., admin token from unexpected IP)
- Run threat hunt for lateral movement patterns post-auth
5. Rotate all authentication secrets
- Application encryption keys (if stored in environment)
- Session signing keys
- JWT secrets used by this service
6. Invalidate long-lived tokens
- Force re-authentication for sessions older than 4 hours
- Reduce token TTL permanently as compensating control
Long-Term
7. Add token validation hardening
- Implement secondary validation layer (e.g., check token against session store)
- Log all DataProtection verification failures
- Alert on unusual claims in tokens (e.g., SYSTEM user from non-admin action)
8. Move to managed identity (Azure)
- Replace DataProtection tokens with Azure Managed Identity where possible
- Reduces exposure of crypto keys in application code
Sources
1. Microsoft Security Advisory - CVE-2026-40372 (MSN)
2. Ayi NEDJIMI Consultants - CVE-2026-40372 Tracking (French security advisory)
Lyrie.ai Cyber Research Division
Lyrie Verdict
Lyrie's autonomous defense layer flags this class of exposure the moment it surfaces — no signature update required.