By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks
Tech News

Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks

By Viral Trending Content 5 Min Read
Share
SHARE

Feb 07, 2025Ravie LakshmananCloud Security / Web Security

Microsoft is warning of an insecure practice wherein software developers are incorporating publicly disclosed ASP.NET machine keys from publicly accessible resources, thereby putting their applications in attackers’ pathway.

The tech giant’s threat intelligence team said it observed limited activity in December 2024 that involved an unknown threat actor using a publicly available, static ASP.NET machine key to inject malicious code and deliver the Godzilla post-exploitation framework.

It also noted that it has identified over 3,000 publicly disclosed keys that could be used for these types of attacks, which it’s calling ViewState code injection attacks.

Cybersecurity

“Whereas many previously known ViewState code injection attacks used compromised or stolen keys that are often sold on dark web forums, these publicly disclosed keys could pose a higher risk because they are available in multiple code repositories and could have been pushed into development code without modification,” Microsoft said.

ViewState is a method used in the ASP.NET framework to preserve page and control values between postbacks. This can also include application data that is specific to a page.

“By default, view state data is stored in the page in a hidden field and is encoded using base64 encoding,” Microsoft notes in its documentation. “In addition, a hash of the view state data is created from the data by using a machine authentication code (MAC) key. The hash value is added to the encoded view state data and the resulting string is stored in the page.”

In using a hash value, the idea is to ensure that the view state data has not been corrupted or tampered with by malicious actors. That said, if these keys are stolen or made accessible to unauthorized third-parties, it opens the door to a scenario where the threat actor can leverage the keys to send a malicious ViewState request and execute arbitrary code.

“When the request is processed by ASP.NET Runtime on the targeted server, the ViewState is decrypted and validated successfully because the right keys are used,” Redmond noted. “The malicious code is then loaded into the worker process memory and executed, providing the threat actor remote code execution capabilities on the target IIS web server.”

Microsoft has provided a list of hash values for the publicly disclosed machine keys, urging customers to check them against the machine keys used in their environments. It has also warned that in the event of a successful exploitation of publicly disclosed keys, merely rotating the keys will not be sufficient as the threat actors may have already established persistence on the host.

To mitigate the risk posed by such attacks, it’s advised to not copy keys from publicly available sources and to regularly rotate keys. As a further step to deter threat actors, Microsoft said it removed key artifacts from “limited instances” where they were included in its documentation.

Cybersecurity

The development comes as cloud security company Aqua revealed details of an OPA Gatekeeper bypass that could be exploited to conduct unauthorized actions in Kubernetes environments, including deploying unauthorized container images.

“In the k8sallowedrepos policy, a security risk arises from how the Rego logic is written in the ConstraintTemplate file,” researchers Yakir Kadkoda and Assaf Morag said in an analysis shared with The Hacker News.

“This risk is further amplified when users define values in the Constraint YAML file that do not align with how the Rego logic processes them. This mismatch can result in policy bypasses, making the restrictions ineffective.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Purple Promo Codes and Deals: Up to 30% Off

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

Optimism at 10-year high, as Europe’s technology sector hits $4trn mark

Honor 500 Release Date Announced as Specs Leak

What to Expect from Apple’s AirPods Pro 4 in 2026

TAGGED: ASP.NET, Cloud security, Code Injection, Cyber Security, Cybersecurity, Internet, Kubernetes, Microsoft, Threat Intelligence, web security
Share This Article
Facebook Twitter Copy Link
Previous Article The Recruitment Effort That Helped Build Elon Musk’s DOGE Army
Next Article How Does Synthetic Data Impact AI Hallucinations?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Next 1000x Crypto News Live Today: Early Alpha on the Latest Crypto Gems (November 19)
Crypto
See How Home Insurance Premiums Are Changing Near You
World News
Chinese astronauts left stranded after space debris smashes return craft
World News
Will the stock market crash before Christmas?
Business
Purple Promo Codes and Deals: Up to 30% Off
Tech News
Malaysia cracks down on crypto power theft as bitcoin mining drains the grid
Crypto
Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Next 1000x Crypto News Live Today: Early Alpha on the Latest Crypto Gems (November 19)

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Next 1000x Crypto News Live Today: Early Alpha on the Latest Crypto Gems (November 19)
November 19, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?