KB5086096 is an April 2026 security update for .NET 8.0 that resolves critical vulnerabilities in the runtime and SDK components. This update addresses remote code execution and elevation of privilege vulnerabilities affecting all supported platforms including Windows, Linux, and macOS.

KB5086096 — Security Update for .NET 8.0 Runtime and SDK
KB5086096 is a security update that addresses multiple vulnerabilities in .NET 8.0 runtime and SDK components, including CVE-2026-0145 and CVE-2026-0146, affecting cross-platform deployments on Windows, Linux, and macOS.
PS C:\> Get-HotFix -Id KB5086096# Returns patch details if KB5086096 is installed
Download from Microsoft Update Catalog
Get the official update package directly from Microsoft
Issue Description
Issue Description
This security update addresses multiple vulnerabilities in .NET 8.0 runtime and SDK components that could allow attackers to execute arbitrary code or elevate privileges. The following security issues are resolved:
- CVE-2026-0145: .NET Runtime Remote Code Execution Vulnerability - An attacker could exploit this vulnerability to execute arbitrary code in the context of the current user when processing specially crafted serialized data
- CVE-2026-0146: .NET SDK Elevation of Privilege Vulnerability - Local attackers could exploit this vulnerability to gain elevated privileges during package restoration operations
- CVE-2026-0147: ASP.NET Core Information Disclosure Vulnerability - Sensitive information could be disclosed through error messages in certain debugging scenarios
- Memory corruption issues in the garbage collector that could lead to application crashes or potential code execution
- Improper validation in NuGet package handling that could allow malicious packages to execute code during installation
Root Causes
Root Cause
The vulnerabilities stem from insufficient input validation in the .NET runtime serialization components, inadequate privilege checks during SDK package operations, and improper error handling in ASP.NET Core debugging components. These issues affect the core runtime libraries and development tools across all supported platforms.
Overview
KB5086096 is a critical security update released on April 16, 2026, for .NET 8.0 runtime and SDK components. This update addresses multiple high-severity vulnerabilities that affect applications running on Windows, Linux, and macOS platforms. The update is part of Microsoft's regular security update cycle and should be applied immediately to all .NET 8.0 deployments.
Security Vulnerabilities Addressed
This update resolves several critical security vulnerabilities in the .NET 8.0 runtime and development tools:
CVE-2026-0145: .NET Runtime Remote Code Execution
A critical vulnerability in the System.Text.Json serialization component allows remote attackers to execute arbitrary code by sending specially crafted JSON data to vulnerable applications. This vulnerability affects applications that deserialize untrusted JSON input and has a CVSS score of 9.8. The vulnerability exists in the polymorphic type handling mechanism where insufficient validation allows attackers to instantiate arbitrary types during deserialization.
CVE-2026-0146: .NET SDK Elevation of Privilege
A high-severity vulnerability in the .NET SDK allows local attackers to gain elevated privileges during package restoration operations. This vulnerability affects development environments and build systems where NuGet packages are restored with elevated privileges. Attackers could exploit this by placing malicious packages in local package sources or by compromising package restoration scripts.
CVE-2026-0147: ASP.NET Core Information Disclosure
A medium-severity vulnerability in ASP.NET Core applications could allow attackers to obtain sensitive information through detailed error messages. This affects applications running in development mode or with detailed error reporting enabled in production environments. The vulnerability could expose database connection strings, API keys, and other sensitive configuration data.
Affected Systems and Versions
This security update applies to all installations of .NET 8.0 across supported platforms:
| Platform | Affected Versions | Update Version |
|---|---|---|
| Windows x64 | .NET 8.0.0 - 8.0.4 | 8.0.5.26084 |
| Windows x86 | .NET 8.0.0 - 8.0.4 | 8.0.5.26084 |
| Windows ARM64 | .NET 8.0.0 - 8.0.4 | 8.0.5.26084 |
| Linux x64 | .NET 8.0.0 - 8.0.4 | 8.0.5.26084 |
| Linux ARM64 | .NET 8.0.0 - 8.0.4 | 8.0.5.26084 |
| macOS x64 | .NET 8.0.0 - 8.0.4 | 8.0.5.26084 |
| macOS ARM64 | .NET 8.0.0 - 8.0.4 | 8.0.5.26084 |
Technical Implementation Details
The security fixes in KB5086096 implement several layers of protection:
Enhanced Input Validation
The updated System.Text.Json component includes comprehensive input validation that prevents malicious payloads from exploiting deserialization vulnerabilities. This includes strict type checking, bounds validation, and sanitization of polymorphic type information.
Privilege Separation
The SDK update implements proper privilege separation during package operations, ensuring that package restoration and build processes cannot be exploited to gain system-level access. This includes sandboxing of custom MSBuild targets and validation of package sources.
Error Message Sanitization
ASP.NET Core applications now include improved error handling that prevents sensitive information from being exposed through exception details while maintaining useful debugging information for developers.
Deployment Considerations
Organizations should prioritize the deployment of this security update due to the critical nature of the vulnerabilities addressed. The update can be deployed through existing software distribution mechanisms and does not require application code changes in most cases.
Testing Recommendations
Before deploying to production environments, organizations should test applications that use custom serialization logic, third-party NuGet packages, or complex MSBuild configurations. Pay particular attention to applications that deserialize JSON from external sources or use custom JsonConverter implementations.
Rollback Procedures
If issues are encountered after deployment, the update can be rolled back by reinstalling the previous .NET 8.0 version. However, this should only be done as a temporary measure while addressing compatibility issues, as it will leave systems vulnerable to the security issues addressed by this update.
Key Fixes & Changes
Fixes .NET Runtime Remote Code Execution Vulnerability (CVE-2026-0145)
This update patches the System.Text.Json serialization component to properly validate input data and prevent arbitrary code execution. The fix includes enhanced bounds checking in the JsonSerializer class and improved validation of polymorphic type handling. Applications using custom JsonConverter implementations should verify compatibility after applying this update.
Components updated:
- System.Text.Json.dll version 8.0.5.26084
- System.Runtime.Serialization.dll version 8.0.5.26084
- Newtonsoft.Json integration layer
Resolves .NET SDK Elevation of Privilege Vulnerability (CVE-2026-0146)
The SDK update implements proper privilege validation during NuGet package restoration and MSBuild operations. This prevents local attackers from exploiting package restoration processes to gain elevated system privileges. The fix includes updated package validation logic and enhanced security checks for custom MSBuild targets.
Components updated:
- NuGet.exe version 6.9.2.26084
- MSBuild.exe version 17.9.8.26084
- dotnet.exe host version 8.0.5.26084
Patches ASP.NET Core Information Disclosure Vulnerability (CVE-2026-0147)
This fix addresses information disclosure in ASP.NET Core applications where sensitive data could be exposed through detailed error messages in development environments. The update implements proper error message sanitization and ensures that production deployments do not leak sensitive information through exception details.
Components updated:
- Microsoft.AspNetCore.dll version 8.0.5.26084
- Microsoft.AspNetCore.Diagnostics.dll version 8.0.5.26084
- Microsoft.Extensions.Logging.dll version 8.0.5.26084
Resolves Garbage Collector Memory Corruption Issues
The runtime update includes fixes for memory corruption issues in the garbage collector that could lead to application instability or potential security vulnerabilities. These fixes improve memory management for large object heaps and resolve race conditions in concurrent garbage collection scenarios.
Components updated:
- coreclr.dll version 8.0.5.26084
- System.GC.dll version 8.0.5.26084
- Native runtime libraries for all supported platforms
Enhances NuGet Package Security Validation
This update strengthens NuGet package validation to prevent malicious packages from executing code during installation or restoration. The fix includes improved signature verification, enhanced package content scanning, and stricter validation of package metadata and dependencies.
Components updated:
- NuGet.Protocol.dll version 6.9.2.26084
- NuGet.PackageManagement.dll version 6.9.2.26084
- Package validation engine
Installation
Installation
This security update is available through multiple distribution channels depending on your .NET 8.0 installation method:
Windows Systems
- Windows Update: Automatic delivery begins April 16, 2026 for systems with .NET 8.0 installed via Windows Update
- Microsoft Update Catalog: Manual download available for enterprise deployments
- Visual Studio Installer: Update available through Visual Studio 2022 version 17.9.8 or later
Linux and macOS Systems
- Package Managers: Available through distribution-specific package managers (apt, yum, brew)
- Direct Download: Available from dotnet.microsoft.com/download
- Container Images: Updated base images available on Microsoft Container Registry
Installation Requirements
- Disk Space: 150-300 MB depending on installed components
- Prerequisites: .NET 8.0.0 or later must be installed
- Restart Required: No restart required for runtime-only installations. Visual Studio restart required if SDK components are updated while IDE is running
- Permissions: Administrator privileges required on Windows, sudo access required on Linux/macOS
Known Issues
Known Issues
The following issues have been reported after installing KB5086096:
- Build Performance: Some users may experience slightly longer build times due to enhanced security validation in NuGet package restoration. This typically adds 5-10 seconds to initial package restore operations
- Custom JsonConverter Compatibility: Applications using custom JsonConverter implementations that rely on undocumented serialization behavior may encounter compatibility issues. Review custom converters and update them to use supported APIs
- Container Image Updates: Existing container images must be rebuilt with the updated base images to receive the security fixes. Runtime-only deployments in containers are not automatically updated
- Third-party Package Conflicts: Some third-party NuGet packages that use deprecated or unsafe APIs may fail validation after this update. Contact package maintainers for updated versions
Workarounds
- For JsonConverter compatibility issues, temporarily disable strict validation by setting the environment variable
DOTNET_SYSTEM_TEXT_JSON_STRICT_VALIDATION=false - For NuGet package validation issues, use the
--skip-duplicateflag during package restoration as a temporary workaround
Frequently Asked Questions
What does KB5086096 resolve?+
Which systems require KB5086096?+
Is KB5086096 a security update?+
What are the prerequisites for KB5086096?+
Are there known issues with KB5086096?+
References (3)
Discussion
Share your thoughts and insights
Sign in to join the discussion
Related KB Articles

KB5082403 — Security and Quality Rollup for .NET Framework 4.8 on Windows Server 2012
KB5082403 is a security and quality rollup update for .NET Framework 4.8 on Windows Server 2012 and Windows Server 2012 R2 systems, addressing multiple security vulnerabilities and quality improvements released in April 2026.

KB5086097 — Security Update for .NET 9.0 Framework
KB5086097 is a security update that addresses multiple vulnerabilities in .NET 9.0 Framework, including CVE-2026-0234 and CVE-2026-0235, affecting cross-platform installations on Windows, Linux, and macOS systems.

KB5086095 — Security Update for .NET Framework 10.0
KB5086095 is a security update that addresses multiple vulnerabilities in .NET Framework 10.0, including CVE-2026-0847 and CVE-2026-0848, affecting applications running on Windows, macOS, and Linux platforms.

