CWE-520: .NET Misconfiguration: Use of Impersonation
low-riskAllowing a .NET application to run at potentially escalated levels of access to the underlying operating and file systems can be dangerous and result in various forms of attacks.
Abstraction: Variant
Common Consequences
Access Control
→
Gain Privileges or Assume Identity
Real-World Examples (2)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2024-46943 | 7.5 | 0.3% | — |
| CVE-2019-25608 | 8.4 | 0.0% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal