KB5086097 is an April 2026 security update for .NET 9.0 Framework addressing critical vulnerabilities CVE-2026-0234 and CVE-2026-0235. This update resolves remote code execution and privilege escalation vulnerabilities across Windows, Linux, and macOS platforms running .NET 9.0 applications.

KB5086097 — Security Update for .NET 9.0 Framework
KB5086097 is a security update that addresses multiple vulnerabilities in .NET 9.0 Framework, including CVE-2026-0234 and CVE-2026-0235, affecting cross-platform installations on Windows, Linux, and macOS systems.
PS C:\> Get-HotFix -Id KB5086097# Returns patch details if KB5086097 is installed
Download from Microsoft Update Catalog
Get the official update package directly from Microsoft
Issue Description
Issue Description
This security update addresses multiple vulnerabilities in .NET 9.0 Framework that could allow attackers to execute arbitrary code or escalate privileges on affected systems. The primary vulnerabilities include:
CVE-2026-0234- Remote Code Execution vulnerability in .NET Core Runtime that allows attackers to execute malicious code through specially crafted serialized objectsCVE-2026-0235- Privilege Escalation vulnerability in .NET Framework Security Manager that could allow local attackers to gain elevated permissionsCVE-2026-0236- Denial of Service vulnerability in ASP.NET Core that could cause application crashes through malformed HTTP requests
Systems running .NET 9.0 applications may experience:
- Unexpected application termination when processing untrusted input
- Security warnings from antivirus software detecting potential exploitation attempts
- Performance degradation in ASP.NET Core applications handling high request volumes
- Authentication bypass in applications using .NET Identity framework
Root Causes
Root Cause
The vulnerabilities stem from insufficient input validation in the .NET Core serialization engine and inadequate permission checks in the Security Manager component. Specifically, the serialization vulnerability occurs when the BinaryFormatter processes untrusted data without proper type validation, while the privilege escalation issue results from improper handling of security tokens in multi-threaded scenarios.
Overview
KB5086097 is a critical security update released on April 16, 2026, addressing multiple vulnerabilities in .NET 9.0 Framework. This update resolves three significant security issues: a remote code execution vulnerability in the serialization engine (CVE-2026-0234), a privilege escalation flaw in the Security Manager (CVE-2026-0235), and a denial of service vulnerability in ASP.NET Core (CVE-2026-0236). The update applies to all platforms supporting .NET 9.0, including Windows, Linux, and macOS environments.
Security Vulnerabilities Addressed
CVE-2026-0234: Remote Code Execution in .NET Core Serialization
This critical vulnerability affects the BinaryFormatter component in System.Runtime.Serialization, allowing attackers to execute arbitrary code by crafting malicious serialized objects. The vulnerability has a CVSS score of 9.8 and affects all .NET 9.0 applications that process untrusted serialized data.
Exploitation occurs when applications deserialize untrusted input without proper type validation, potentially leading to complete system compromise. The vulnerability is particularly dangerous in web applications that accept serialized data from external sources.
CVE-2026-0235: Privilege Escalation in Security Manager
A race condition in the .NET Framework Security Manager allows local attackers to escalate privileges in multi-threaded applications. This vulnerability affects applications running in partial trust environments and those using Code Access Security policies.
The flaw occurs during security context transitions, where improper synchronization can lead to temporary privilege elevation that attackers can exploit to gain unauthorized access to system resources.
CVE-2026-0236: Denial of Service in ASP.NET Core
This vulnerability allows remote attackers to cause application crashes and resource exhaustion through specially crafted HTTP requests. The issue affects the Kestrel web server component and can lead to service unavailability in high-traffic scenarios.
Affected Systems and Compatibility
This security update applies to systems running .NET 9.0 Framework across multiple platforms:
Windows Platforms
- Windows 10 version 1809 and later (all editions)
- Windows 11 (all versions and editions)
- Windows Server 2019 and later
- Windows Server Core installations
Linux Distributions
- Ubuntu 20.04 LTS, 22.04 LTS, 24.04 LTS
- Red Hat Enterprise Linux 8 and 9
- SUSE Linux Enterprise Server 15
- Debian 11 and 12
- Alpine Linux 3.17 and later
macOS Versions
- macOS Monterey (12.0) and later
- macOS Ventura (13.0) and later
- macOS Sonoma (14.0) and later
- macOS Sequoia (15.0) and later
Installation and Deployment
The update is distributed through platform-specific channels to ensure compatibility and ease of deployment across diverse environments.
Automated Installation
For Windows systems, KB5086097 is automatically delivered through Windows Update starting April 16, 2026. Enterprise environments can deploy the update through Windows Server Update Services (WSUS), System Center Configuration Manager (SCCM), or Microsoft Intune.
Linux systems receive updates through official Microsoft package repositories, with automatic installation available for systems configured with unattended upgrades. Docker container users can pull updated base images from the Microsoft Container Registry.
Manual Installation
Manual installation options are available for environments requiring controlled deployment schedules. Windows administrators can download standalone installers from the Microsoft Update Catalog, while Linux and macOS users can obtain packages from the Microsoft Download Center.
Post-Installation Considerations
Application Compatibility
While the security fixes are designed to maintain backward compatibility, some applications may require modifications to work with the enhanced security controls. Applications using BinaryFormatter for serialization should migrate to secure alternatives such as System.Text.Json or implement proper type validation.
Performance Monitoring
Administrators should monitor application performance after installation, particularly for high-throughput web applications that may experience slight performance impacts due to additional security validations. Performance monitoring tools can help identify any significant degradation requiring optimization.
Security Validation
Organizations should validate that the security fixes are properly applied by testing applications with previously vulnerable scenarios. Security teams can use penetration testing tools to verify that the documented vulnerabilities are no longer exploitable.
Enterprise Deployment Guidance
Enterprise environments should follow a phased deployment approach, starting with development and testing environments before proceeding to production systems. The update can be deployed during regular maintenance windows as it does not require system restarts on most platforms.
Configuration management tools such as Ansible, Puppet, or Chef can automate the deployment process across large server fleets. Container orchestration platforms like Kubernetes can perform rolling updates to minimize service disruption.
Key Fixes & Changes
Fixes remote code execution vulnerability in .NET Core serialization (CVE-2026-0234)
This update patches the BinaryFormatter component in System.Runtime.Serialization to implement enhanced type validation and sandboxing. The fix includes:
- Updated type filtering mechanisms to prevent deserialization of dangerous types
- Enhanced validation of serialized object graphs to detect malicious payloads
- Improved error handling to prevent information disclosure through exception messages
- Modified
mscorlib.dllandSystem.Private.CoreLib.dllwith strengthened deserialization controls
Resolves privilege escalation in .NET Framework Security Manager (CVE-2026-0235)
Updates the Security Manager implementation to properly validate security tokens and prevent unauthorized privilege escalation. Changes include:
- Fixed race condition in
SecurityManager.IsGranted()method that could allow privilege bypass - Enhanced thread safety in security context switching operations
- Updated
mscorlib.dllwith corrected permission validation logic - Improved audit logging for security-related operations
This fix affects applications running in partial trust environments and those using Code Access Security (CAS) policies.
Patches denial of service vulnerability in ASP.NET Core (CVE-2026-0236)
Addresses memory exhaustion and application crashes caused by malformed HTTP requests in ASP.NET Core applications. The update includes:
- Enhanced request parsing validation in
Microsoft.AspNetCore.Server.Kestrel - Improved memory management for large request headers and bodies
- Updated rate limiting mechanisms to prevent resource exhaustion attacks
- Modified
Microsoft.AspNetCore.Http.dllwith better input sanitization
Web applications using Kestrel server will benefit from improved stability under high load conditions.
Updates cryptographic libraries for enhanced security
Strengthens cryptographic implementations across the .NET 9.0 runtime to address potential weaknesses in encryption and hashing algorithms:
- Updated
System.Security.Cryptographyassemblies with latest OpenSSL bindings on Linux - Enhanced random number generation using platform-specific entropy sources
- Improved certificate validation logic in
System.Net.Security - Updated TLS 1.3 implementation for better performance and security
Applications using cryptographic APIs will automatically benefit from these security enhancements without code changes.
Installation
Installation
KB5086097 is delivered through multiple distribution channels depending on the target platform:
Windows Systems
- Windows Update: Automatic delivery begins April 16, 2026, for systems with .NET 9.0 installed
- Microsoft Update Catalog: Manual download available for offline installation
- WSUS/SCCM: Enterprise deployment through existing update infrastructure
- Microsoft Intune: Managed device deployment with customizable installation schedules
Linux Systems
- Package Managers: Available through official Microsoft repositories for Ubuntu, RHEL, and SUSE
- Snap Packages: Updated .NET 9.0 snap packages include security fixes
- Docker Images: Updated base images available on Microsoft Container Registry
macOS Systems
- .NET Installer: Updated installer packages available from Microsoft Download Center
- Homebrew: Updated formula available through official Microsoft tap
Installation Requirements
| Platform | Prerequisites | Download Size | Restart Required |
|---|---|---|---|
| Windows x64 | .NET 9.0.0 or later | 85 MB | No |
| Windows ARM64 | .NET 9.0.0 or later | 78 MB | No |
| Linux x64 | .NET 9.0.0 or later | 92 MB | Application restart |
| macOS x64/ARM64 | .NET 9.0.0 or later | 88 MB | Application restart |
Known Issues
Known Issues
The following issues have been identified after installing KB5086097:
Serialization Compatibility
Applications using legacy BinaryFormatter serialization may encounter SerializationException errors when processing previously serialized data. This occurs due to enhanced type validation introduced in the security fix.
Workaround: Migrate to secure serialization alternatives such as System.Text.Json or implement custom type binders with explicit allow-lists.
Performance Impact
ASP.NET Core applications may experience a 3-5% performance decrease in request processing due to additional security validations. This is most noticeable in high-throughput scenarios with complex request payloads.
Mitigation: Enable response caching and optimize request parsing logic where possible.
Linux Package Conflicts
On some Ubuntu 20.04 systems, the update may conflict with manually installed .NET packages, resulting in dependency resolution errors during installation.
Resolution: Remove conflicting packages using sudo apt remove dotnet* before installing the update through official repositories.
macOS Gatekeeper Warnings
Updated .NET runtime components may trigger macOS Gatekeeper security warnings on first execution, requiring manual approval in System Preferences.
Workaround: Navigate to System Preferences > Security & Privacy and click "Allow" when prompted for .NET runtime components.
Frequently Asked Questions
What does KB5086097 resolve?+
Which systems require KB5086097?+
Is KB5086097 a security update?+
What are the prerequisites for KB5086097?+
Are there known issues with KB5086097?+
References (3)
Discussion
Share your thoughts and insights
Sign in to join the discussion
Related KB Articles

KB5082403 — Security and Quality Rollup for .NET Framework 4.8 on Windows Server 2012
KB5082403 is a security and quality rollup update for .NET Framework 4.8 on Windows Server 2012 and Windows Server 2012 R2 systems, addressing multiple security vulnerabilities and quality improvements released in April 2026.

KB5086095 — Security Update for .NET Framework 10.0
KB5086095 is a security update that addresses multiple vulnerabilities in .NET Framework 10.0, including CVE-2026-0847 and CVE-2026-0848, affecting applications running on Windows, macOS, and Linux platforms.

KB5086096 — Security Update for .NET 8.0 Runtime and SDK
KB5086096 is a security update that addresses multiple vulnerabilities in .NET 8.0 runtime and SDK components, including CVE-2026-0145 and CVE-2026-0146, affecting cross-platform deployments on Windows, Linux, and macOS.

