Introduction

EVS is actively responding to the reported vulnerability in ASP .NET. We are currently conducting a product-by-product analysis to determine if any are potentially impacted by the vulnerability. This is an ongoing investigation, so please check this bulletin page frequently for updates.

Description

Inconsistent interpretation of http requests ('http request/response smuggling') in ASP.NET Core allows an authorized attacker to bypass a security feature over a network.

An attacker who successfully exploited this vulnerability could view sensitive information such as other user's credentials (Confidentiality) and make changes to file contents on the target server (Integrity), and they might be able to force a crash within the server (Availability).

 

Products under investigation

Windows Products 

ProductVersionStatusPatched Version
CerebrumAllNot vulnerable 
IPDirectorAllVulnerableAvailable soon
IPWeb API ServicesAllVulnerableAvailable soon
XPloreAllUnder analysis 
XedioAllEnd of life 
C-CastAllEnd of life 
MADAllUnder analysis 
XTAccessAllVulnerable

4.15.94 

4.16.94

XViewerAllVulnerable

4.15.94 

4.16.29

VIA XSquareAll Vulnerable 4.16
XFile3AllVulnerable

XFile3 6.10 Nov-release

XFilLite 6.10  Nov-release

XNetMonitor / XNetWebMonitorAllNot vulnerable

3.0.2

Move I/O / Move UPAllVulnerableAvailable soon
C-NEXTAllEnd of life 
Ingest FunnelAllEnd of life 
MultiReviewAllEnd of life 
Truck ManagerAllEnd of life 

 

Linux Products

ProductVersionStatusPatched version
NeuronAllNot vulnerable 
SynapseAllUnder analysis 
VIA MAPAllVulnerableAvailable soon
IPWeb Streaming ServerAllUnder analysis 
MediaHubAllVulnerableAvailable soon
XT / MulticamAllNot vulnerable 
XHub-VIAAllNot vulnerable 
XS-NEOAllNot vulnerable 
XR-NEOAllNot vulnerable 
XeebraAllNot vulnerable 
LSGAllUnder analysis 
LSM-VIAAllVulnerableAvailable soon
XtraMotionAllVulnerableAvailable soon
DYVI End of life 
Ingest Funnel End of life 

This list is under investigation and will be regularly updated.

Please contact the EVS support team to have more information.

More information

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315

https://github.com/dotnet/aspnetcore/issues/64033

https://devblogs.microsoft.com/dotnet/dotnet-and-dotnet-framework-october-2025-servicing-updates/ 

https://www.nuget.org/packages/Microsoft.AspNetCore.Server.Kestrel.Core