Summary:Microsoft has issued a critical warning about a growing security risk in which developers are unknowingly incorporating publicly disclosed
ASP.NET machine keys from online sources, making their applications vulnerable to cyberattacks. The company’s threat intelligence team observed a limited but concerning attack in December 2024, where an unidentified threat actor exploited a publicly available, static
ASP.NET machine key to inject malicious code and deploy the Godzilla post-exploitation framework. Microsoft further revealed that over 3,000 publicly disclosed machine keys are available online, putting thousands of applications at risk through what it has termed ViewState code injection attacks.
Traditionally, ViewState attacks have involved stolen or compromised keys, often traded on dark web forums, but these newly disclosed keys pose an even greater risk due to their widespread availability in open-source code repositories. Many of these keys may have been unintentionally pushed into production environments by developers without realizing the security implications. ViewState, a mechanism in
ASP.NET that maintains page and control values across postbacks, relies on a machine authentication code key to hash and validate the data. If an attacker gains access to these keys, they can create malicious ViewState requests, allowing them to execute arbitrary code remotely on the targeted IIS web server.
Security Officer Comments:The attack works by tricking the
ASP.NET runtime into decrypting and validating a malicious ViewState request using a legitimate but publicly available machine key. Once processed, the malicious code is loaded into the worker process memory, granting the attacker remote code execution capabilities. Microsoft has warned that simply rotating compromised keys may not be sufficient, as threat actors could have already established persistence on affected systems. To help organizations identify exposure, Microsoft has provided hash values for known disclosed machine keys, urging security teams to compare them against their own environments.
Suggested Corrections:Microsoft has provided a
list of hash values for the publicly disclosed machine keys, urging customers to
check them against the machine keys used in their environments. It has also warned that in the event of a successful exploitation of publicly disclosed keys, merely rotating the keys will not be sufficient as the threat actors may have already established persistence on the host. To mitigate the risk posed by such attacks, it's advised to not copy keys from publicly available sources and to regularly rotate keys. As a further step to deter threat actors, Microsoft said it removed key artifacts from "limited instances" where they were included in its documentation.
Link(s):https://thehackernews.com/2025/02/microsoft-identifies-3000-publicly.html