{"id":98143,"date":"2026-04-24T18:17:37","date_gmt":"2026-04-24T18:17:37","guid":{"rendered":"https:\/\/mybusinessfuture.com\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/"},"modified":"2026-05-10T21:23:39","modified_gmt":"2026-05-10T21:23:39","slug":"microsoft-aspnet-core-cve-2026-40372-medium-business-dev","status":"publish","type":"post","link":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/","title":{"rendered":"Microsoft ASP.NET Core CVE-2026-40372 (CVSS 9.1): Why Mid-Sized Dev Shops and In-House Developers Need an Inventory Now"},"content":{"rendered":"<p style=\"display:inline-block;background:#F21F05;color:#fff;padding:4px 14px;border-radius:20px;font-size:0.85em;margin-bottom:18px;\">7 Min. reading time \u00b7 Published: 23.04.2026<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\"><strong>On April 22, 2026, Microsoft publicly disclosed a privilege escalation vulnerability in ASP.NET Core with a CVSS score of 9.1, tracked as CVE-2026-40372. A patch is available in DataProtection 10.0.7. For medium-sized development shops and family businesses with in-house development, the situation is operationally precarious: no one knows exactly which in-house applications use the affected library. A swift 48-hour inventory sweep is the right response in 2026, followed by structured patch routines for the next quarters.<\/strong><\/p>\n<div style=\"border-left:4px solid #F21F05;padding:16px 20px;margin:24px 0;background:#fff5f5;border-radius:0 8px 8px 0;\">\n<h2 style=\"margin-top:0;\">The Essentials<\/h2>\n<ul>\n<li style=\"line-height:1.8;margin-bottom:8px;\">Microsoft released an out-of-band update on April 22, 2026, for CVE-2026-40372, with a CVSS score of 9.1.<\/li>\n<li style=\"line-height:1.8;margin-bottom:8px;\">The DataProtection library in ASP.NET Core versions 10.0.0 to 10.0.6 is affected, with a fix in version 10.0.7.<\/li>\n<li style=\"line-height:1.8;margin-bottom:8px;\">Medium-sized development shops and family businesses with in-house development often lack a complete inventory of their in-house applications.<\/li>\n<li style=\"line-height:1.8;margin-bottom:8px;\">Recommended immediate reaction: 48-hour inventory sweep with SBOM tools, followed by prioritized patch rollout.<\/li>\n<li style=\"line-height:1.8;margin-bottom:0;\">Management should use this incident as an opportunity for a fundamental discussion about patch routines and software bills of materials.<\/li>\n<\/ul>\n<\/div>\n<h2 style=\"padding-top:64px;margin-bottom:20px;\">What the vulnerability does<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\"><strong>What is CVE-2026-40372?<\/strong> CVE-2026-40372 is a privilege escalation vulnerability in the ASP.NET Core DataProtection library, disclosed on April 22, 2026, with a CVSS score of 9.1. The vulnerability arises from a regression in cryptographic signature verification. An attacker can bypass validation using an all-zero HMAC and thereby forge authentication cookies. The subsequent attack enables privilege escalation to SYSTEM level on the host. Versions 10.0.0 to 10.0.6 are affected, with a fix available in version 10.0.7.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">For medium-sized companies with their own development teams, this vulnerability is particularly relevant for two reasons. Firstly, ASP.NET Core is one of the most widely used platforms for in-house specialist applications in DACH mid-sized companies. From sales dashboards to service portals and logistics control, much of this runs on .NET 10. Secondly, in-house developed applications are often difficult to inventory because they are not stored in central IT asset databases. The combination is treacherous.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">The bug can be exploited remotely and requires no authentication. Anyone operating an ASP.NET Core application with DataProtection in the specified version range has an open attack vector. The risk is higher the longer the application is exposed and the shorter the reaction time after disclosure. <a href=\"https:\/\/www.securitytoday.de\/2026\/04\/24\/microsoft-aspnet-core-cve-2026-40372-out-of-band-72h-plan-april-2026\/\">The Security Today news variant<\/a> provides the operational depth for security teams.<\/p>\n<div class=\"evm-stat evm-stat-row\" style=\"display:flex;gap:16px;margin:32px 0;flex-wrap:wrap;\">\n<div style=\"flex:1;min-width:200px;text-align:center;background:#fff5f5;border-radius:8px;padding:20px 12px;border-top:3px solid #F21F05;\">\n<div style=\"font-size:28px;font-weight:700;color:#c0392b;\">CVSS 9.1<\/div>\n<div style=\"font-size:12px;color:#444;margin-top:4px;\">Privilege escalation in DataProtection<\/div><\/div>\n<div style=\"flex:1;min-width:200px;text-align:center;background:#fff5f5;border-radius:8px;padding:20px 12px;border-top:3px solid #F21F05;\">\n<div style=\"font-size:28px;font-weight:700;color:#c0392b;\">10.0.7<\/div>\n<div style=\"font-size:12px;color:#444;margin-top:4px;\">Patch version, affected versions 10.0.0 to 10.0.6<\/div><\/div>\n<div style=\"flex:1;min-width:200px;text-align:center;background:#fff5f5;border-radius:8px;padding:20px 12px;border-top:3px solid #F21F05;\">\n<div style=\"font-size:28px;font-weight:700;color:#c0392b;\">48 hrs<\/div>\n<div style=\"font-size:12px;color:#444;margin-top:4px;\">Recommended inventory reaction for mid-sized companies<\/div><\/div>\n<\/div>\n<h2 style=\"padding-top:64px;margin-bottom:20px;\">Why in-house mid-market development is particularly affected<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Three patterns in the DACH mid-market are amplifying the impact of this gap. Firstly: Many family-owned businesses have built their own specialized applications over the past decade, which are now critical to their operations. These applications were developed using .NET, Java, or Python and are often in maintenance mode, not active development mode. Patches are irregular, and the inventory of used libraries is rarely complete.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Secondly: Mid-market development shops often have three to eight developers who handle multiple projects simultaneously. SBOM (Software Bill of Materials) tooling is frequently still in the setup phase in this size class. Without automated software inventory, responding to such gaps takes longer than necessary. In critical incidents, this costs days during which the gap remains open.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Thirdly: External service providers that manage mid-market in-house development often communicate CVE (Common Vulnerabilities and Exposures) waves with a delay. If a management team only learns about critical gaps from industry press, they have a supplier control problem. <a href=\"https:\/\/mybusinessfuture.com\/fortune-it-services-6000-milliarden-cognizant-outcome-mittelstand-2026\/\">The Fortune discussion on outcome-based IT services<\/a> has shown that provider models will be structurally under pressure in 2026. If you have a good IT service provider, you should proactively approach them.<\/p>\n<div class=\"evm-pros-cons\" style=\"display:flex;gap:16px;margin:32px 0;flex-wrap:wrap;\">\n<div style=\"flex:1;min-width:260px;background:#fff5f5;border-left:4px solid #F21F05;padding:20px 24px;border-radius:0 8px 8px 0;\">\n<h3 style=\"margin-top:0;font-size:1em;color:#c0392b;\">What management should do now<\/h3>\n<ul style=\"padding-left:20px;margin:0;color:#444;line-height:1.7;\">\n<li>48-hour inventory sweep with SBOM tools like Trivy, Grype, or Snyk<\/li>\n<li>Proactively approach external IT service providers and inquire about their status<\/li>\n<li>Prioritized patch roll-out based on business criticality<\/li>\n<li>Fundamentally rethink patch routines for 2026<\/li>\n<\/ul><\/div>\n<div style=\"flex:1;min-width:260px;background:#fafafa;border-left:4px solid #888;padding:20px 24px;border-radius:0 8px 8px 0;\">\n<h3 style=\"margin-top:0;font-size:1em;color:#444;\">What is not enough<\/h3>\n<ul style=\"padding-left:20px;margin:0;color:#444;line-height:1.7;\">\n<li>Relying on Microsoft Patch Tuesday routines, as out-of-band updates run separately<\/li>\n<li>Assuming that external service providers communicate proactively<\/li>\n<li>Patching without re-deployment in productive environments<\/li>\n<li>Trusting that &#8220;we are not accessible from outside&#8221;<\/li>\n<\/ul><\/div>\n<\/div>\n<h2 style=\"padding-top:64px;margin-bottom:20px;\">A 48-Hour Plan for Mid-Sized Company Executives<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Two days are enough for a thorough inventory sweep\u2014if executive leadership, IT management, and external service providers work in sync. The following steps are designed for mid-sized organizations with 100 to 1,000 employees.<\/p>\n<div class=\"evm-timeline\" style=\"margin:32px 0;\">\n<div style=\"display:flex;gap:16px;margin-bottom:16px;padding:16px;border-left:3px solid #F21F05;background:#fff5f5;\">\n<div style=\"font-weight:700;color:#c0392b;min-width:100px;\">Hour 0\u20136<\/div>\n<div style=\"line-height:1.7;\">Briefing. Executive management informs IT leadership about the vulnerability; IT leadership contacts external service providers. Define clear responsibilities.<\/div><\/div>\n<div style=\"display:flex;gap:16px;margin-bottom:16px;padding:16px;border-left:3px solid #F21F05;background:#fff5f5;\">\n<div style=\"font-weight:700;color:#c0392b;min-width:100px;\">Hour 6\u201318<\/div>\n<div style=\"line-height:1.7;\">Inventory sweep. Apply SBOM tools to all in-house applications, conduct container image scans, and interview Dev teams. Compile a list of all affected applications with versions.<\/div><\/div>\n<div style=\"display:flex;gap:16px;margin-bottom:16px;padding:16px;border-left:3px solid #F21F05;background:#fff5f5;\">\n<div style=\"font-weight:700;color:#c0392b;min-width:100px;\">Hour 18\u201330<\/div>\n<div style=\"line-height:1.7;\">Triage. Which applications are internet-facing? Which contain sensitive data? Which are used in regulated processes? Prioritize by risk level.<\/div><\/div>\n<div style=\"display:flex;gap:16px;margin-bottom:16px;padding:16px;border-left:3px solid #F21F05;background:#fff5f5;\">\n<div style=\"font-weight:700;color:#c0392b;min-width:100px;\">Hour 30\u201342<\/div>\n<div style=\"line-height:1.7;\">Patch rollout. Upgrade DataProtection to version 10.0.7 or higher, redeploy into production environments, rotate cookies in particularly exposed applications.<\/div><\/div>\n<div style=\"display:flex;gap:16px;margin-bottom:0;padding:16px;border-left:3px solid #F21F05;background:#fff5f5;\">\n<div style=\"font-weight:700;color:#c0392b;min-width:100px;\">Hour 42\u201348<\/div>\n<div style=\"line-height:1.7;\">Reporting. Report status to executive management, document audit trail, inform compliance officers, and assess whether regulatory authorities must be notified.<\/div><\/div>\n<\/div>\n<h2 style=\"padding-top:64px;margin-bottom:20px;\">What This Vulnerability Reveals About Mid-Sized Companies\u2019 Patch Readiness<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\">CVE-2026-40372 is not the first critical incident in April 2026\u2014and it won\u2019t be the last. The frequency of critical CVEs has noticeably increased over the past twelve months. Where mid-sized companies could expect three critical CVEs per quarter in 2024, by 2026 they face two per week. This vulnerability has become a litmus test for patch maturity.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">Three investments are worth making in response. First: embed SBOM tooling into your development pipeline. Providers like Anchore, Snyk, and Sysdig offer affordable packages for mid-sized businesses. Typical costs are in the low five-figure range per year and pay for themselves during the first serious incident. Second: establish patch tracking as a quarterly routine. Microsoft Security Response Center, CISA\u2019s KEV catalog, and BSI advisories should be reviewed weekly. Third: update contracts with external service providers to include obligations for patch communication.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">For your next executive meeting, consider asking two concrete questions: How long does it take at our company from learning about a CVE to deploying a production patch? Anyone who can answer this in 30 seconds with a clear number already has an effective security routine. Anyone offering vague responses has identified a clear investment need for 2026. A second question\u2014about your current SBOM status\u2014delivers the same insight into organizational maturity. Both questions are worth including as standard agenda items in executive briefings every quarter.<\/p>\n<h2 style=\"padding-top:64px;margin-bottom:20px;\">How the gap fits into the April picture<\/h2>\n<p style=\"line-height:1.8;margin-bottom:20px;\">CVE-2026-40372 is part of a wave that Constellation Research, Deloitte, and several industry analyses have described as a structural shift in 2026. <a href=\"https:\/\/mybusinessfuture.com\/constellation-enterprise-intelligence-april-2026-ray-wang-dach-vorstand-mittelstand\/\">Constellation Enterprise Intelligence April<\/a> highlighted cybersecurity responsibility as a control layer for AI operations. <a href=\"https:\/\/mybusinessfuture.com\/deloitte-state-of-ai-enterprise-2026-report-mittelstand-execution-luecke\/\">The Deloitte State of AI 2026<\/a> quantified the execution gap. Both sources confirm that operational security maturity has become a strategic imperative.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">For medium-sized management teams, this conveys a consistent message. In 2026, security issues are no longer IT routine, but a matter of executive responsibility. Those who treat SBOM discipline, patch tracking, and supplier communication as operational necessities build a resilient position against the next CVE wave. Those who delegate and fail to verify will encounter avoidable friction in every wave.<\/p>\n<p style=\"line-height:1.8;margin-bottom:20px;\">One final observation belongs in the strategic discussion. Medium-sized businesses that document their patch response well have better cards in insurance and compliance discussions in 2026. Insurers are increasingly asking for specific patch times and SBOM status. Those who document clearly receive more favorable cyber insurance conditions. Those who remain vague pay more or face tight exclusions. This consequence will be visible in every mid-market balance sheet over the next 18 months.<\/p>\n<h2 style=\"padding-top:64px;margin-bottom:20px;\">Frequently Asked Questions<\/h2>\n<details style=\"border:1px solid #e9ecef;border-radius:6px;background:#f8f9fa;margin-bottom:8px;\">\n<summary style=\"padding:14px 18px;cursor:pointer;font-weight:600;\"><strong>Which ASP.NET Core versions are affected?<\/strong><\/summary>\n<p style=\"padding:14px 20px 18px;color:#495057;line-height:1.7;\">DataProtection library in versions 10.0.0 to 10.0.6. The patch in 10.0.7 has been available since April 22, 2026. Older major versions are not directly affected but should be checked regardless of their lifecycle status.<\/p>\n<\/details>\n<details style=\"border:1px solid #e9ecef;border-radius:6px;background:#f8f9fa;margin-bottom:8px;\">\n<summary style=\"padding:14px 18px;cursor:pointer;font-weight:600;\"><strong>How do we determine if our in-house applications are affected?<\/strong><\/summary>\n<p style=\"padding:14px 20px 18px;color:#495057;line-height:1.7;\">SBOM search for Microsoft.AspNetCore.DataProtection in one of the mentioned versions. Container image scans with Trivy, Grype, or Snyk identify affected packages. Dev teams can usually provide status within a few hours if they document their supply chains.<\/p>\n<\/details>\n<details style=\"border:1px solid #e9ecef;border-radius:6px;background:#f8f9fa;margin-bottom:8px;\">\n<summary style=\"padding:14px 18px;cursor:pointer;font-weight:600;\"><strong>Who is liable in the event of an incident involving external service provider code?<\/strong><\/summary>\n<p style=\"padding:14px 20px 18px;color:#495057;line-height:1.7;\">Responsibility is distributed according to contractual arrangements. Classic work contracts assign operational patch responsibility to the client, not the service provider. Those with outcome or managed contracts including patch clauses can hold the service provider more accountable. A contractual clarification is worthwhile before the next incident.<\/p>\n<\/details>\n<details style=\"border:1px solid #e9ecef;border-radius:6px;background:#f8f9fa;margin-bottom:8px;\">\n<summary style=\"padding:14px 18px;cursor:pointer;font-weight:600;\"><strong>Is cookie rotation always necessary?<\/strong><\/summary>\n<p style=\"padding:14px 20px 18px;color:#495057;line-height:1.7;\">Not necessarily. For applications with short internet exposure, the patch suffices. For longer exposed applications, cookie rotation is advisable because it cannot be safely ruled out that cookies have already been compromised. In doubt, rotate.<\/p>\n<\/details>\n<details style=\"border:1px solid #e9ecef;border-radius:6px;background:#f8f9fa;margin-bottom:8px;\">\n<summary style=\"padding:14px 18px;cursor:pointer;font-weight:600;\"><strong>Which SBOM tools are suitable for medium-sized Dev Shops?<\/strong><\/summary>\n<p style=\"padding:14px 20px 18px;color:#495057;line-height:1.7;\">Trivy and Grype are free open-source solutions that can be integrated into CI pipelines. Snyk and Anchore offer commercial packages with better reporting features and enterprise support. For the first steps, open-source tools suffice; for five or more developers, a commercial solution is worthwhile.<\/p>\n<\/details>\n<details style=\"border:1px solid #e9ecef;border-radius:6px;background:#f8f9fa;margin-bottom:8px;\">\n<summary style=\"padding:14px 18px;cursor:pointer;font-weight:600;\"><strong>How often should executives inquire about patch status?<\/strong><\/summary>\n<p style=\"padding:14px 20px 18px;color:#495057;line-height:1.7;\">Quarterly as a standard, immediately in the case of critical incidents like CVE-2026-40372. A brief question in the next executive meeting significantly changes the attention of IT management. Once this is established, regularly informed answers can be expected.<\/p>\n<\/details>\n<div class=\"evm-styled-box\" style=\"background:#fff5f5;padding:20px 24px;margin:24px 0;border-top:3px solid #F21F05;\">\n<h2 style=\"margin-top:0;margin-bottom:12px;font-size:1.05em;\">Editor&#8217;s Reading Recommendations<\/h2>\n<p style=\"margin:0 0 8px;line-height:1.6;\"><a href=\"https:\/\/mybusinessfuture.com\/deloitte-state-of-ai-enterprise-2026-report-mittelstand-execution-luecke\/\">Deloitte State of AI 2026: Execution Gap and Medium-Sized Enterprise Maturity<\/a><\/p>\n<p style=\"margin:0 0 8px;line-height:1.6;\"><a href=\"https:\/\/mybusinessfuture.com\/constellation-enterprise-intelligence-april-2026-ray-wang-dach-vorstand-mittelstand\/\">Constellation Enterprise Intelligence April 2026<\/a><\/p>\n<p style=\"margin:0;line-height:1.6;\"><a href=\"https:\/\/mybusinessfuture.com\/fortune-it-services-6000-milliarden-cognizant-outcome-mittelstand-2026\/\">Fortune Report April 22: IT Services Outcome Models<\/a><\/p>\n<\/div>\n<div class=\"evm-styled-box\" style=\"background:#f8f9fa;padding:20px 24px;margin:24px 0;border-top:3px solid #354037;\">\n<h2 style=\"margin-top:0;margin-bottom:12px;font-size:1.05em;\">More from the MBF Media Network<\/h2>\n<p style=\"margin:0 0 8px;line-height:1.6;\"><a href=\"https:\/\/www.cloudmagazin.com\/2026\/04\/24\/saas-sprawl-audit-mittelstand-2026-90-tage-finops-procurement\/\">Cloudmagazin: SaaS Sprawl Audit in the Mid-Market<\/a><\/p>\n<p style=\"margin:0 0 8px;line-height:1.6;\"><a href=\"https:\/\/www.digital-chiefs.de\/it-services-outcome-fortune-22-april-2026-dach-vorstand-cognizant-c-level\/\">Digital Chiefs: IT Services as Outcome Business<\/a><\/p>\n<p style=\"margin:0;line-height:1.6;\"><a href=\"https:\/\/www.securitytoday.de\/2026\/04\/24\/microsoft-aspnet-core-cve-2026-40372-out-of-band-72h-plan-april-2026\/\">SecurityToday: Microsoft ASP.NET Core CVE-2026-40372<\/a><\/p>\n<\/div>\n<p style=\"text-align:right;font-style:italic;color:#888;font-size:0.85em;margin-top:24px;\">Source of title image: Pexels \/ cottonbro studio (px:6804068)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ASP.NET Core CVE-2026-40372 with a CVSS score of 9.1: What mid-sized dev shops should do now. 48-hour inventory sweep with SBOM tools and patch readiness discussion.<\/p>\n","protected":false},"author":160,"featured_media":97928,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Microsoft ASP.","_yoast_wpseo_title":"Microsoft ASP.NET Core CVE-2026-40372 (CVSS 9.1): Why Mid-Sized Dev Shops and In","_yoast_wpseo_metadesc":"ASP.NET Core CVE-2026-40372 with CVSS 9.1: 48-hour inventory sweep for mid-sized dev shops, SBOM tools & patch readiness for management.","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_meta-robots-nofollow":"","_yoast_wpseo_meta-robots-adv":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_opengraph-image-id":0,"_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_twitter-image-id":0,"featured_post_sortierung":0,"featured_post":0,"pre_headline":"","bildquelle":"","teasertext":"","language":"de","footnotes":""},"categories":[2214,2027],"tags":[],"class_list":["post-98143","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence","category-kuenstliche-intelligenz","entry"],"wpml_language":"en","wpml_translation_of":97929,"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft ASP.NET Core CVE-2026-40372 (CVSS 9.1): Why Mid-Sized Dev Shops and In<\/title>\n<meta name=\"description\" content=\"ASP.NET Core CVE-2026-40372 with CVSS 9.1: 48-hour inventory sweep for mid-sized dev shops, SBOM tools &amp; patch readiness for management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft ASP.NET Core CVE-2026-40372 (CVSS 9.1): Why Mid-Sized Dev Shops and In\" \/>\n<meta property=\"og:description\" content=\"ASP.NET Core CVE-2026-40372 with CVSS 9.1: 48-hour inventory sweep for mid-sized dev shops, SBOM tools &amp; patch readiness for management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/\" \/>\n<meta property=\"og:site_name\" content=\"MyBusinessFuture\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MyBusinessFuture\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-24T18:17:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-10T21:23:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2026\/04\/aspnet-mittelstand-px6804068.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2160\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Benedikt Langer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mbusinessfuture\" \/>\n<meta name=\"twitter:site\" content=\"@mbusinessfuture\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Benedikt Langer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/\"},\"author\":{\"name\":\"Benedikt Langer\",\"@id\":\"https:\/\/mybusinessfuture.com\/#\/schema\/person\/2c6c900f809c3c375dc455db50d1e7b1\"},\"headline\":\"Microsoft ASP.NET Core CVE-2026-40372 (CVSS 9.1): Why Mid-Sized Dev Shops and In-House Developers Need an Inventory Now\",\"datePublished\":\"2026-04-24T18:17:37+00:00\",\"dateModified\":\"2026-05-10T21:23:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/\"},\"wordCount\":1598,\"publisher\":{\"@id\":\"https:\/\/mybusinessfuture.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2026\/04\/aspnet-mittelstand-px6804068.jpg\",\"articleSection\":[\"Artificial Intelligence\",\"K\u00fcnstliche Intelligenz\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/\",\"url\":\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/\",\"name\":\"Microsoft ASP.NET Core CVE-2026-40372 (CVSS 9.1): Why Mid-Sized Dev Shops and In\",\"isPartOf\":{\"@id\":\"https:\/\/mybusinessfuture.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2026\/04\/aspnet-mittelstand-px6804068.jpg\",\"datePublished\":\"2026-04-24T18:17:37+00:00\",\"dateModified\":\"2026-05-10T21:23:39+00:00\",\"description\":\"ASP.NET Core CVE-2026-40372 with CVSS 9.1: 48-hour inventory sweep for mid-sized dev shops, SBOM tools & patch readiness for management.\",\"breadcrumb\":{\"@id\":\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#primaryimage\",\"url\":\"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2026\/04\/aspnet-mittelstand-px6804068.jpg\",\"contentUrl\":\"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2026\/04\/aspnet-mittelstand-px6804068.jpg\",\"width\":2160,\"height\":1440,\"caption\":\"Quelle: Pexels \/ cottonbro studio (px:6804068)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/mybusinessfuture.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft ASP.NET Core CVE-2026-40372 (CVSS 9.1): Why Mid-Sized Dev Shops and In-House Developers Need an Inventory Now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mybusinessfuture.com\/#website\",\"url\":\"https:\/\/mybusinessfuture.com\/\",\"name\":\"MyBusinessFuture\",\"description\":\"B2B-Magazin f\u00fcr Digitalisierung, KI und Business-Innovation \u2014 Fachartikel f\u00fcr IT-Entscheider im DACH-Raum\",\"publisher\":{\"@id\":\"https:\/\/mybusinessfuture.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mybusinessfuture.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mybusinessfuture.com\/#organization\",\"name\":\"MyBusinessFuture\",\"url\":\"https:\/\/mybusinessfuture.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mybusinessfuture.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2020\/10\/MBF-logo-schwarz.png\",\"contentUrl\":\"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2020\/10\/MBF-logo-schwarz.png\",\"width\":398,\"height\":241,\"caption\":\"MyBusinessFuture\"},\"image\":{\"@id\":\"https:\/\/mybusinessfuture.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MyBusinessFuture\",\"https:\/\/x.com\/mbusinessfuture\",\"https:\/\/www.linkedin.com\/showcase\/mybusinessfuture\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mybusinessfuture.com\/#\/schema\/person\/2c6c900f809c3c375dc455db50d1e7b1\",\"name\":\"Benedikt Langer\",\"description\":\"Benedikt Langer befasst sich als Chefredakteur bei MyBusinessFuture mit Digitalisierung, Cloud-Strategien und KI-Anwendungen f\u00fcr Unternehmen. Mit besonderem Fokus auf K\u00fcnstliche Intelligenz, digitale Infrastruktur und strategische Cloud-Architekturen beleuchtet er technologische Entwicklungen und deren Auswirkungen auf Business-Entscheidungen.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/benedikt-langer\/\",\"https:\/\/www.linkedin.com\/in\/benedikt-langer-574b8a20b\/\"],\"url\":\"https:\/\/mybusinessfuture.com\/en\/experte\/benedikt-langer\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft ASP.NET Core CVE-2026-40372 (CVSS 9.1): Why Mid-Sized Dev Shops and In","description":"ASP.NET Core CVE-2026-40372 with CVSS 9.1: 48-hour inventory sweep for mid-sized dev shops, SBOM tools & patch readiness for management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft ASP.NET Core CVE-2026-40372 (CVSS 9.1): Why Mid-Sized Dev Shops and In","og_description":"ASP.NET Core CVE-2026-40372 with CVSS 9.1: 48-hour inventory sweep for mid-sized dev shops, SBOM tools & patch readiness for management.","og_url":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/","og_site_name":"MyBusinessFuture","article_publisher":"https:\/\/www.facebook.com\/MyBusinessFuture","article_published_time":"2026-04-24T18:17:37+00:00","article_modified_time":"2026-05-10T21:23:39+00:00","og_image":[{"width":2160,"height":1440,"url":"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2026\/04\/aspnet-mittelstand-px6804068.jpg","type":"image\/jpeg"}],"author":"Benedikt Langer","twitter_card":"summary_large_image","twitter_creator":"@mbusinessfuture","twitter_site":"@mbusinessfuture","twitter_misc":{"Written by":"Benedikt Langer","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#article","isPartOf":{"@id":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/"},"author":{"name":"Benedikt Langer","@id":"https:\/\/mybusinessfuture.com\/#\/schema\/person\/2c6c900f809c3c375dc455db50d1e7b1"},"headline":"Microsoft ASP.NET Core CVE-2026-40372 (CVSS 9.1): Why Mid-Sized Dev Shops and In-House Developers Need an Inventory Now","datePublished":"2026-04-24T18:17:37+00:00","dateModified":"2026-05-10T21:23:39+00:00","mainEntityOfPage":{"@id":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/"},"wordCount":1598,"publisher":{"@id":"https:\/\/mybusinessfuture.com\/#organization"},"image":{"@id":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#primaryimage"},"thumbnailUrl":"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2026\/04\/aspnet-mittelstand-px6804068.jpg","articleSection":["Artificial Intelligence","K\u00fcnstliche Intelligenz"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/","url":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/","name":"Microsoft ASP.NET Core CVE-2026-40372 (CVSS 9.1): Why Mid-Sized Dev Shops and In","isPartOf":{"@id":"https:\/\/mybusinessfuture.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#primaryimage"},"image":{"@id":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#primaryimage"},"thumbnailUrl":"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2026\/04\/aspnet-mittelstand-px6804068.jpg","datePublished":"2026-04-24T18:17:37+00:00","dateModified":"2026-05-10T21:23:39+00:00","description":"ASP.NET Core CVE-2026-40372 with CVSS 9.1: 48-hour inventory sweep for mid-sized dev shops, SBOM tools & patch readiness for management.","breadcrumb":{"@id":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#primaryimage","url":"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2026\/04\/aspnet-mittelstand-px6804068.jpg","contentUrl":"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2026\/04\/aspnet-mittelstand-px6804068.jpg","width":2160,"height":1440,"caption":"Quelle: Pexels \/ cottonbro studio (px:6804068)"},{"@type":"BreadcrumbList","@id":"https:\/\/mybusinessfuture.com\/en\/microsoft-aspnet-core-cve-2026-40372-medium-business-dev\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/mybusinessfuture.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft ASP.NET Core CVE-2026-40372 (CVSS 9.1): Why Mid-Sized Dev Shops and In-House Developers Need an Inventory Now"}]},{"@type":"WebSite","@id":"https:\/\/mybusinessfuture.com\/#website","url":"https:\/\/mybusinessfuture.com\/","name":"MyBusinessFuture","description":"B2B-Magazin f\u00fcr Digitalisierung, KI und Business-Innovation \u2014 Fachartikel f\u00fcr IT-Entscheider im DACH-Raum","publisher":{"@id":"https:\/\/mybusinessfuture.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mybusinessfuture.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mybusinessfuture.com\/#organization","name":"MyBusinessFuture","url":"https:\/\/mybusinessfuture.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mybusinessfuture.com\/#\/schema\/logo\/image\/","url":"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2020\/10\/MBF-logo-schwarz.png","contentUrl":"https:\/\/mybusinessfuture.com\/wp-content\/uploads\/2020\/10\/MBF-logo-schwarz.png","width":398,"height":241,"caption":"MyBusinessFuture"},"image":{"@id":"https:\/\/mybusinessfuture.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MyBusinessFuture","https:\/\/x.com\/mbusinessfuture","https:\/\/www.linkedin.com\/showcase\/mybusinessfuture\/"]},{"@type":"Person","@id":"https:\/\/mybusinessfuture.com\/#\/schema\/person\/2c6c900f809c3c375dc455db50d1e7b1","name":"Benedikt Langer","description":"Benedikt Langer befasst sich als Chefredakteur bei MyBusinessFuture mit Digitalisierung, Cloud-Strategien und KI-Anwendungen f\u00fcr Unternehmen. Mit besonderem Fokus auf K\u00fcnstliche Intelligenz, digitale Infrastruktur und strategische Cloud-Architekturen beleuchtet er technologische Entwicklungen und deren Auswirkungen auf Business-Entscheidungen.","sameAs":["https:\/\/www.linkedin.com\/in\/benedikt-langer\/","https:\/\/www.linkedin.com\/in\/benedikt-langer-574b8a20b\/"],"url":"https:\/\/mybusinessfuture.com\/en\/experte\/benedikt-langer\/"}]}},"_links":{"self":[{"href":"https:\/\/mybusinessfuture.com\/en\/wp-json\/wp\/v2\/posts\/98143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mybusinessfuture.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mybusinessfuture.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mybusinessfuture.com\/en\/wp-json\/wp\/v2\/users\/160"}],"replies":[{"embeddable":true,"href":"https:\/\/mybusinessfuture.com\/en\/wp-json\/wp\/v2\/comments?post=98143"}],"version-history":[{"count":1,"href":"https:\/\/mybusinessfuture.com\/en\/wp-json\/wp\/v2\/posts\/98143\/revisions"}],"predecessor-version":[{"id":99490,"href":"https:\/\/mybusinessfuture.com\/en\/wp-json\/wp\/v2\/posts\/98143\/revisions\/99490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mybusinessfuture.com\/en\/wp-json\/wp\/v2\/media\/97928"}],"wp:attachment":[{"href":"https:\/\/mybusinessfuture.com\/en\/wp-json\/wp\/v2\/media?parent=98143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mybusinessfuture.com\/en\/wp-json\/wp\/v2\/categories?post=98143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mybusinessfuture.com\/en\/wp-json\/wp\/v2\/tags?post=98143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}