CWE-520: .NET Misconfiguration: Use of Impersonation

low-risk

Allowing a .NET application to run at potentially escalated levels of access to the underlying operating and file systems can be dangerous and result in various forms of attacks.

Abstraction: Variant

Common Consequences

Access Control Gain Privileges or Assume Identity

Real-World Examples (2)

CVE CVSS EPSS KEV
CVE-2024-46943 7.5 0.3%
CVE-2019-25608 8.4 0.0%
0
/ 100
low-risk
Active Threat 0/50 · Minimal
Exploit Availability 0/50 · Minimal