Cyber Posture

CVE-2026-32178

High

Published: 14 April 2026

Published
14 April 2026
Modified
07 May 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0004 13.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32178 is a high-severity Improper Neutralization of Special Elements (CWE-138) vulnerability in Microsoft .Net. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely flaw remediation through patching the specific improper neutralization vulnerability in .NET, preventing exploitation of CVE-2026-32178.

prevent

SI-10 enforces information input validation and neutralization of special elements in network traffic, directly countering the CWE-138 vulnerability in .NET.

prevent

SC-23 protects the authenticity of communications sessions, mitigating network-based spoofing attacks enabled by this .NET vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Remote network-accessible .NET neutralization flaw directly enables exploitation via T1190 (public-facing app) and facilitates network spoofing behaviors covered by T1557 (Adversary-in-the-Middle).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper neutralization of special elements in .NET allows an unauthorized attacker to perform spoofing over a network.

Deeper analysisAI

CVE-2026-32178 is an improper neutralization of special elements vulnerability (CWE-138) in .NET that enables an unauthorized attacker to perform spoofing over a network. Published on 2026-04-14, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), highlighting its network accessibility, low attack complexity, lack of prerequisites, and significant confidentiality impact.

Any unauthenticated attacker can exploit this vulnerability remotely without user interaction by sending crafted network traffic that bypasses neutralization controls in .NET. Successful exploitation allows spoofing, potentially leading to high-impact confidentiality violations, such as unauthorized access to sensitive data.

Mitigation guidance is available in the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178.

Details

CWE(s)

Affected Products

microsoft
.net
10.0.0 — 10.0.6 · 8.0.0 — 8.0.26 · 9.0.0 — 9.0.15
microsoft
visual studio 2022
17.12.0 — 17.12.19 · 17.14.0 — 17.14.30

CVEs Like This One

CVE-2026-21218Same product: Apple Macos
CVE-2025-21171Same product: Apple Macos
CVE-2026-32203Same product: Apple Macos
CVE-2025-21172Same product: Apple Macos
CVE-2026-26171Same product: Apple Macos
CVE-2026-26127Same product: Apple Macos
CVE-2025-0502Same product: Apple Macos
CVE-2026-35560Same product: Apple Macos
CVE-2026-3598Same product: Apple Macos
CVE-2026-33116Same product: Apple Macos

References