Anavem
Languagefr
Developer workstation showing .NET Framework security update installation interface
Knowledge BaseKB5086097.NET Framework

KB5086097 — Security Update for .NET 9.0 Framework

KB5086097 is a security update that addresses multiple vulnerabilities in .NET 9.0 Framework, including CVE-2026-0234 and CVE-2026-0235, affecting cross-platform installations on Windows, Linux, and macOS systems.

16 April 2026 12 min read
KB5086097.NET FrameworkSecurity Update 4 fixes 12 min .NET 9.0 on Windows 10/11 +4Download
Quick Overview

KB5086097 is an April 2026 security update for .NET 9.0 Framework addressing critical vulnerabilities CVE-2026-0234 and CVE-2026-0235. This update resolves remote code execution and privilege escalation vulnerabilities across Windows, Linux, and macOS platforms running .NET 9.0 applications.

PowerShellCheck if KB5086097 is installed
PS C:\> Get-HotFix -Id KB5086097

# Returns patch details if KB5086097 is installed

Download Update

Download from Microsoft Update Catalog

Get the official update package directly from Microsoft

KB5086097
Diagnostic

Issue Description

Issue Description

This security update addresses multiple vulnerabilities in .NET 9.0 Framework that could allow attackers to execute arbitrary code or escalate privileges on affected systems. The primary vulnerabilities include:

  • CVE-2026-0234 - Remote Code Execution vulnerability in .NET Core Runtime that allows attackers to execute malicious code through specially crafted serialized objects
  • CVE-2026-0235 - Privilege Escalation vulnerability in .NET Framework Security Manager that could allow local attackers to gain elevated permissions
  • CVE-2026-0236 - Denial of Service vulnerability in ASP.NET Core that could cause application crashes through malformed HTTP requests

Systems running .NET 9.0 applications may experience:

  • Unexpected application termination when processing untrusted input
  • Security warnings from antivirus software detecting potential exploitation attempts
  • Performance degradation in ASP.NET Core applications handling high request volumes
  • Authentication bypass in applications using .NET Identity framework
Analysis

Root Causes

Root Cause

The vulnerabilities stem from insufficient input validation in the .NET Core serialization engine and inadequate permission checks in the Security Manager component. Specifically, the serialization vulnerability occurs when the BinaryFormatter processes untrusted data without proper type validation, while the privilege escalation issue results from improper handling of security tokens in multi-threaded scenarios.

Overview

KB5086097 is a critical security update released on April 16, 2026, addressing multiple vulnerabilities in .NET 9.0 Framework. This update resolves three significant security issues: a remote code execution vulnerability in the serialization engine (CVE-2026-0234), a privilege escalation flaw in the Security Manager (CVE-2026-0235), and a denial of service vulnerability in ASP.NET Core (CVE-2026-0236). The update applies to all platforms supporting .NET 9.0, including Windows, Linux, and macOS environments.

Security Vulnerabilities Addressed

CVE-2026-0234: Remote Code Execution in .NET Core Serialization

This critical vulnerability affects the BinaryFormatter component in System.Runtime.Serialization, allowing attackers to execute arbitrary code by crafting malicious serialized objects. The vulnerability has a CVSS score of 9.8 and affects all .NET 9.0 applications that process untrusted serialized data.

Exploitation occurs when applications deserialize untrusted input without proper type validation, potentially leading to complete system compromise. The vulnerability is particularly dangerous in web applications that accept serialized data from external sources.

CVE-2026-0235: Privilege Escalation in Security Manager

A race condition in the .NET Framework Security Manager allows local attackers to escalate privileges in multi-threaded applications. This vulnerability affects applications running in partial trust environments and those using Code Access Security policies.

The flaw occurs during security context transitions, where improper synchronization can lead to temporary privilege elevation that attackers can exploit to gain unauthorized access to system resources.

CVE-2026-0236: Denial of Service in ASP.NET Core

This vulnerability allows remote attackers to cause application crashes and resource exhaustion through specially crafted HTTP requests. The issue affects the Kestrel web server component and can lead to service unavailability in high-traffic scenarios.

Affected Systems and Compatibility

This security update applies to systems running .NET 9.0 Framework across multiple platforms:

Windows Platforms

  • Windows 10 version 1809 and later (all editions)
  • Windows 11 (all versions and editions)
  • Windows Server 2019 and later
  • Windows Server Core installations

Linux Distributions

  • Ubuntu 20.04 LTS, 22.04 LTS, 24.04 LTS
  • Red Hat Enterprise Linux 8 and 9
  • SUSE Linux Enterprise Server 15
  • Debian 11 and 12
  • Alpine Linux 3.17 and later

macOS Versions

  • macOS Monterey (12.0) and later
  • macOS Ventura (13.0) and later
  • macOS Sonoma (14.0) and later
  • macOS Sequoia (15.0) and later

Installation and Deployment

The update is distributed through platform-specific channels to ensure compatibility and ease of deployment across diverse environments.

Automated Installation

For Windows systems, KB5086097 is automatically delivered through Windows Update starting April 16, 2026. Enterprise environments can deploy the update through Windows Server Update Services (WSUS), System Center Configuration Manager (SCCM), or Microsoft Intune.

Linux systems receive updates through official Microsoft package repositories, with automatic installation available for systems configured with unattended upgrades. Docker container users can pull updated base images from the Microsoft Container Registry.

Manual Installation

Manual installation options are available for environments requiring controlled deployment schedules. Windows administrators can download standalone installers from the Microsoft Update Catalog, while Linux and macOS users can obtain packages from the Microsoft Download Center.

Post-Installation Considerations

Application Compatibility

While the security fixes are designed to maintain backward compatibility, some applications may require modifications to work with the enhanced security controls. Applications using BinaryFormatter for serialization should migrate to secure alternatives such as System.Text.Json or implement proper type validation.

Performance Monitoring

Administrators should monitor application performance after installation, particularly for high-throughput web applications that may experience slight performance impacts due to additional security validations. Performance monitoring tools can help identify any significant degradation requiring optimization.

Security Validation

Organizations should validate that the security fixes are properly applied by testing applications with previously vulnerable scenarios. Security teams can use penetration testing tools to verify that the documented vulnerabilities are no longer exploitable.

Enterprise Deployment Guidance

Enterprise environments should follow a phased deployment approach, starting with development and testing environments before proceeding to production systems. The update can be deployed during regular maintenance windows as it does not require system restarts on most platforms.

Configuration management tools such as Ansible, Puppet, or Chef can automate the deployment process across large server fleets. Container orchestration platforms like Kubernetes can perform rolling updates to minimize service disruption.

Resolution Methods

Key Fixes & Changes

01

Fixes remote code execution vulnerability in .NET Core serialization (CVE-2026-0234)

This update patches the BinaryFormatter component in System.Runtime.Serialization to implement enhanced type validation and sandboxing. The fix includes:

  • Updated type filtering mechanisms to prevent deserialization of dangerous types
  • Enhanced validation of serialized object graphs to detect malicious payloads
  • Improved error handling to prevent information disclosure through exception messages
  • Modified mscorlib.dll and System.Private.CoreLib.dll with strengthened deserialization controls
Important: Applications using custom serialization may require code changes to maintain compatibility.
02

Resolves privilege escalation in .NET Framework Security Manager (CVE-2026-0235)

Updates the Security Manager implementation to properly validate security tokens and prevent unauthorized privilege escalation. Changes include:

  • Fixed race condition in SecurityManager.IsGranted() method that could allow privilege bypass
  • Enhanced thread safety in security context switching operations
  • Updated mscorlib.dll with corrected permission validation logic
  • Improved audit logging for security-related operations

This fix affects applications running in partial trust environments and those using Code Access Security (CAS) policies.

03

Patches denial of service vulnerability in ASP.NET Core (CVE-2026-0236)

Addresses memory exhaustion and application crashes caused by malformed HTTP requests in ASP.NET Core applications. The update includes:

  • Enhanced request parsing validation in Microsoft.AspNetCore.Server.Kestrel
  • Improved memory management for large request headers and bodies
  • Updated rate limiting mechanisms to prevent resource exhaustion attacks
  • Modified Microsoft.AspNetCore.Http.dll with better input sanitization

Web applications using Kestrel server will benefit from improved stability under high load conditions.

04

Updates cryptographic libraries for enhanced security

Strengthens cryptographic implementations across the .NET 9.0 runtime to address potential weaknesses in encryption and hashing algorithms:

  • Updated System.Security.Cryptography assemblies with latest OpenSSL bindings on Linux
  • Enhanced random number generation using platform-specific entropy sources
  • Improved certificate validation logic in System.Net.Security
  • Updated TLS 1.3 implementation for better performance and security

Applications using cryptographic APIs will automatically benefit from these security enhancements without code changes.

Validation

Installation

Installation

KB5086097 is delivered through multiple distribution channels depending on the target platform:

Windows Systems

  • Windows Update: Automatic delivery begins April 16, 2026, for systems with .NET 9.0 installed
  • Microsoft Update Catalog: Manual download available for offline installation
  • WSUS/SCCM: Enterprise deployment through existing update infrastructure
  • Microsoft Intune: Managed device deployment with customizable installation schedules

Linux Systems

  • Package Managers: Available through official Microsoft repositories for Ubuntu, RHEL, and SUSE
  • Snap Packages: Updated .NET 9.0 snap packages include security fixes
  • Docker Images: Updated base images available on Microsoft Container Registry

macOS Systems

  • .NET Installer: Updated installer packages available from Microsoft Download Center
  • Homebrew: Updated formula available through official Microsoft tap

Installation Requirements

PlatformPrerequisitesDownload SizeRestart Required
Windows x64.NET 9.0.0 or later85 MBNo
Windows ARM64.NET 9.0.0 or later78 MBNo
Linux x64.NET 9.0.0 or later92 MBApplication restart
macOS x64/ARM64.NET 9.0.0 or later88 MBApplication restart
Note: Running applications must be restarted to load the updated runtime components.
If it still fails

Known Issues

Known Issues

The following issues have been identified after installing KB5086097:

Serialization Compatibility

Applications using legacy BinaryFormatter serialization may encounter SerializationException errors when processing previously serialized data. This occurs due to enhanced type validation introduced in the security fix.

Workaround: Migrate to secure serialization alternatives such as System.Text.Json or implement custom type binders with explicit allow-lists.

Performance Impact

ASP.NET Core applications may experience a 3-5% performance decrease in request processing due to additional security validations. This is most noticeable in high-throughput scenarios with complex request payloads.

Mitigation: Enable response caching and optimize request parsing logic where possible.

Linux Package Conflicts

On some Ubuntu 20.04 systems, the update may conflict with manually installed .NET packages, resulting in dependency resolution errors during installation.

Resolution: Remove conflicting packages using sudo apt remove dotnet* before installing the update through official repositories.

macOS Gatekeeper Warnings

Updated .NET runtime components may trigger macOS Gatekeeper security warnings on first execution, requiring manual approval in System Preferences.

Workaround: Navigate to System Preferences > Security & Privacy and click "Allow" when prompted for .NET runtime components.

Frequently Asked Questions

What does KB5086097 resolve?+
KB5086097 resolves three critical security vulnerabilities in .NET 9.0 Framework: CVE-2026-0234 (remote code execution in serialization), CVE-2026-0235 (privilege escalation in Security Manager), and CVE-2026-0236 (denial of service in ASP.NET Core). The update strengthens input validation, fixes race conditions, and improves memory management across all supported platforms.
Which systems require KB5086097?+
All systems running .NET 9.0 Framework require this update, including Windows 10/11, Windows Server 2019/2022/2025, Ubuntu 20.04/22.04/24.04, RHEL 8/9, SUSE Linux Enterprise Server 15, Debian 11/12, Alpine Linux 3.17+, and macOS 12-15. Both x64 and ARM64 architectures are supported across all platforms.
Is KB5086097 a security update?+
Yes, KB5086097 is a critical security update addressing multiple vulnerabilities with CVSS scores ranging from 7.5 to 9.8. It patches remote code execution, privilege escalation, and denial of service vulnerabilities that could allow attackers to compromise systems running .NET 9.0 applications. Immediate installation is recommended for all affected systems.
What are the prerequisites for KB5086097?+
The primary prerequisite is having .NET 9.0.0 or later installed on the target system. Windows systems require no additional prerequisites, while Linux systems need access to official Microsoft package repositories. macOS systems require administrator privileges for installation. No prior security updates are required, but running applications must be restarted after installation.
Are there known issues with KB5086097?+
Known issues include potential SerializationException errors in applications using legacy BinaryFormatter, 3-5% performance impact in high-throughput ASP.NET Core applications, package conflicts on some Ubuntu 20.04 systems, and macOS Gatekeeper warnings for updated runtime components. Workarounds and mitigation strategies are available for all identified issues.

References (3)

Discussion

Share your thoughts and insights

Sign in to join the discussion