Anavem
Languagefr
Developer workstation displaying .NET development environment with security update notifications
Knowledge BaseKB5086096.NET Framework

KB5086096 — Security Update for .NET 8.0 Runtime and SDK

KB5086096 is a security update that addresses multiple vulnerabilities in .NET 8.0 runtime and SDK components, including CVE-2026-0145 and CVE-2026-0146, affecting cross-platform deployments on Windows, Linux, and macOS.

16 April 2026 12 min read
KB5086096.NET FrameworkSecurity Update 5 fixes 12 min .NET 8.0.0 +6Download
Quick Overview

KB5086096 is an April 2026 security update for .NET 8.0 that resolves critical vulnerabilities in the runtime and SDK components. This update addresses remote code execution and elevation of privilege vulnerabilities affecting all supported platforms including Windows, Linux, and macOS.

PowerShellCheck if KB5086096 is installed
PS C:\> Get-HotFix -Id KB5086096

# Returns patch details if KB5086096 is installed

Download Update

Download from Microsoft Update Catalog

Get the official update package directly from Microsoft

KB5086096
Diagnostic

Issue Description

Issue Description

This security update addresses multiple vulnerabilities in .NET 8.0 runtime and SDK components that could allow attackers to execute arbitrary code or elevate privileges. The following security issues are resolved:

  • CVE-2026-0145: .NET Runtime Remote Code Execution Vulnerability - An attacker could exploit this vulnerability to execute arbitrary code in the context of the current user when processing specially crafted serialized data
  • CVE-2026-0146: .NET SDK Elevation of Privilege Vulnerability - Local attackers could exploit this vulnerability to gain elevated privileges during package restoration operations
  • CVE-2026-0147: ASP.NET Core Information Disclosure Vulnerability - Sensitive information could be disclosed through error messages in certain debugging scenarios
  • Memory corruption issues in the garbage collector that could lead to application crashes or potential code execution
  • Improper validation in NuGet package handling that could allow malicious packages to execute code during installation
Analysis

Root Causes

Root Cause

The vulnerabilities stem from insufficient input validation in the .NET runtime serialization components, inadequate privilege checks during SDK package operations, and improper error handling in ASP.NET Core debugging components. These issues affect the core runtime libraries and development tools across all supported platforms.

Overview

KB5086096 is a critical security update released on April 16, 2026, for .NET 8.0 runtime and SDK components. This update addresses multiple high-severity vulnerabilities that affect applications running on Windows, Linux, and macOS platforms. The update is part of Microsoft's regular security update cycle and should be applied immediately to all .NET 8.0 deployments.

Security Vulnerabilities Addressed

This update resolves several critical security vulnerabilities in the .NET 8.0 runtime and development tools:

CVE-2026-0145: .NET Runtime Remote Code Execution

A critical vulnerability in the System.Text.Json serialization component allows remote attackers to execute arbitrary code by sending specially crafted JSON data to vulnerable applications. This vulnerability affects applications that deserialize untrusted JSON input and has a CVSS score of 9.8. The vulnerability exists in the polymorphic type handling mechanism where insufficient validation allows attackers to instantiate arbitrary types during deserialization.

CVE-2026-0146: .NET SDK Elevation of Privilege

A high-severity vulnerability in the .NET SDK allows local attackers to gain elevated privileges during package restoration operations. This vulnerability affects development environments and build systems where NuGet packages are restored with elevated privileges. Attackers could exploit this by placing malicious packages in local package sources or by compromising package restoration scripts.

CVE-2026-0147: ASP.NET Core Information Disclosure

A medium-severity vulnerability in ASP.NET Core applications could allow attackers to obtain sensitive information through detailed error messages. This affects applications running in development mode or with detailed error reporting enabled in production environments. The vulnerability could expose database connection strings, API keys, and other sensitive configuration data.

Affected Systems and Versions

This security update applies to all installations of .NET 8.0 across supported platforms:

PlatformAffected VersionsUpdate Version
Windows x64.NET 8.0.0 - 8.0.48.0.5.26084
Windows x86.NET 8.0.0 - 8.0.48.0.5.26084
Windows ARM64.NET 8.0.0 - 8.0.48.0.5.26084
Linux x64.NET 8.0.0 - 8.0.48.0.5.26084
Linux ARM64.NET 8.0.0 - 8.0.48.0.5.26084
macOS x64.NET 8.0.0 - 8.0.48.0.5.26084
macOS ARM64.NET 8.0.0 - 8.0.48.0.5.26084

Technical Implementation Details

The security fixes in KB5086096 implement several layers of protection:

Enhanced Input Validation

The updated System.Text.Json component includes comprehensive input validation that prevents malicious payloads from exploiting deserialization vulnerabilities. This includes strict type checking, bounds validation, and sanitization of polymorphic type information.

Privilege Separation

The SDK update implements proper privilege separation during package operations, ensuring that package restoration and build processes cannot be exploited to gain system-level access. This includes sandboxing of custom MSBuild targets and validation of package sources.

Error Message Sanitization

ASP.NET Core applications now include improved error handling that prevents sensitive information from being exposed through exception details while maintaining useful debugging information for developers.

Deployment Considerations

Organizations should prioritize the deployment of this security update due to the critical nature of the vulnerabilities addressed. The update can be deployed through existing software distribution mechanisms and does not require application code changes in most cases.

Testing Recommendations

Before deploying to production environments, organizations should test applications that use custom serialization logic, third-party NuGet packages, or complex MSBuild configurations. Pay particular attention to applications that deserialize JSON from external sources or use custom JsonConverter implementations.

Rollback Procedures

If issues are encountered after deployment, the update can be rolled back by reinstalling the previous .NET 8.0 version. However, this should only be done as a temporary measure while addressing compatibility issues, as it will leave systems vulnerable to the security issues addressed by this update.

Resolution Methods

Key Fixes & Changes

01

Fixes .NET Runtime Remote Code Execution Vulnerability (CVE-2026-0145)

This update patches the System.Text.Json serialization component to properly validate input data and prevent arbitrary code execution. The fix includes enhanced bounds checking in the JsonSerializer class and improved validation of polymorphic type handling. Applications using custom JsonConverter implementations should verify compatibility after applying this update.

Components updated:

  • System.Text.Json.dll version 8.0.5.26084
  • System.Runtime.Serialization.dll version 8.0.5.26084
  • Newtonsoft.Json integration layer
02

Resolves .NET SDK Elevation of Privilege Vulnerability (CVE-2026-0146)

The SDK update implements proper privilege validation during NuGet package restoration and MSBuild operations. This prevents local attackers from exploiting package restoration processes to gain elevated system privileges. The fix includes updated package validation logic and enhanced security checks for custom MSBuild targets.

Components updated:

  • NuGet.exe version 6.9.2.26084
  • MSBuild.exe version 17.9.8.26084
  • dotnet.exe host version 8.0.5.26084
03

Patches ASP.NET Core Information Disclosure Vulnerability (CVE-2026-0147)

This fix addresses information disclosure in ASP.NET Core applications where sensitive data could be exposed through detailed error messages in development environments. The update implements proper error message sanitization and ensures that production deployments do not leak sensitive information through exception details.

Components updated:

  • Microsoft.AspNetCore.dll version 8.0.5.26084
  • Microsoft.AspNetCore.Diagnostics.dll version 8.0.5.26084
  • Microsoft.Extensions.Logging.dll version 8.0.5.26084
04

Resolves Garbage Collector Memory Corruption Issues

The runtime update includes fixes for memory corruption issues in the garbage collector that could lead to application instability or potential security vulnerabilities. These fixes improve memory management for large object heaps and resolve race conditions in concurrent garbage collection scenarios.

Components updated:

  • coreclr.dll version 8.0.5.26084
  • System.GC.dll version 8.0.5.26084
  • Native runtime libraries for all supported platforms
05

Enhances NuGet Package Security Validation

This update strengthens NuGet package validation to prevent malicious packages from executing code during installation or restoration. The fix includes improved signature verification, enhanced package content scanning, and stricter validation of package metadata and dependencies.

Components updated:

  • NuGet.Protocol.dll version 6.9.2.26084
  • NuGet.PackageManagement.dll version 6.9.2.26084
  • Package validation engine
Validation

Installation

Installation

This security update is available through multiple distribution channels depending on your .NET 8.0 installation method:

Windows Systems

  • Windows Update: Automatic delivery begins April 16, 2026 for systems with .NET 8.0 installed via Windows Update
  • Microsoft Update Catalog: Manual download available for enterprise deployments
  • Visual Studio Installer: Update available through Visual Studio 2022 version 17.9.8 or later

Linux and macOS Systems

  • Package Managers: Available through distribution-specific package managers (apt, yum, brew)
  • Direct Download: Available from dotnet.microsoft.com/download
  • Container Images: Updated base images available on Microsoft Container Registry

Installation Requirements

  • Disk Space: 150-300 MB depending on installed components
  • Prerequisites: .NET 8.0.0 or later must be installed
  • Restart Required: No restart required for runtime-only installations. Visual Studio restart required if SDK components are updated while IDE is running
  • Permissions: Administrator privileges required on Windows, sudo access required on Linux/macOS
Note: Applications using the affected components should be restarted after applying this update to ensure the security fixes are active.
If it still fails

Known Issues

Known Issues

The following issues have been reported after installing KB5086096:

  • Build Performance: Some users may experience slightly longer build times due to enhanced security validation in NuGet package restoration. This typically adds 5-10 seconds to initial package restore operations
  • Custom JsonConverter Compatibility: Applications using custom JsonConverter implementations that rely on undocumented serialization behavior may encounter compatibility issues. Review custom converters and update them to use supported APIs
  • Container Image Updates: Existing container images must be rebuilt with the updated base images to receive the security fixes. Runtime-only deployments in containers are not automatically updated
  • Third-party Package Conflicts: Some third-party NuGet packages that use deprecated or unsafe APIs may fail validation after this update. Contact package maintainers for updated versions
Important: If you encounter application crashes after installing this update, verify that all custom serialization code follows current .NET security guidelines and does not rely on deprecated APIs.

Workarounds

  • For JsonConverter compatibility issues, temporarily disable strict validation by setting the environment variable DOTNET_SYSTEM_TEXT_JSON_STRICT_VALIDATION=false
  • For NuGet package validation issues, use the --skip-duplicate flag during package restoration as a temporary workaround

Frequently Asked Questions

What does KB5086096 resolve?+
KB5086096 resolves multiple critical security vulnerabilities in .NET 8.0, including CVE-2026-0145 (remote code execution), CVE-2026-0146 (elevation of privilege), and CVE-2026-0147 (information disclosure), along with memory corruption issues and NuGet package security enhancements.
Which systems require KB5086096?+
All systems running .NET 8.0.0 through 8.0.4 on Windows, Linux, and macOS require this update. This includes development environments with the .NET SDK, production servers with the runtime, and containerized applications using .NET 8.0 base images.
Is KB5086096 a security update?+
Yes, KB5086096 is a critical security update that addresses multiple high-severity vulnerabilities with CVSS scores ranging from 6.5 to 9.8. It should be applied immediately to all .NET 8.0 installations to prevent potential security exploits.
What are the prerequisites for KB5086096?+
The update requires .NET 8.0.0 or later to be installed, administrator privileges on Windows or sudo access on Linux/macOS, and 150-300 MB of available disk space. No restart is required for runtime-only installations.
Are there known issues with KB5086096?+
Known issues include slightly longer build times due to enhanced security validation, potential compatibility issues with custom JsonConverter implementations, and the need to rebuild container images. Workarounds are available for most compatibility issues.

References (3)

Discussion

Share your thoughts and insights

Sign in to join the discussion