Home Microsoft CVE-2025-36855
Back to Microsoft

CVE-2025-36855

.NET - DiaSymReader.dll

Microsoft CVSS 8.8 Updated March 12, 2026

Executive Risk Summary

"A buffer over-read vulnerability exists in DiaSymReader.dll due to improper buffer access mechanisms, affecting End Of Life (EOL) ASP.NET versions. This vulnerability can be exploited to read sensitive data from memory, but no future updates or support will be provided by Microsoft."

Operational Audit Arsenal

Target Type DLL
Target Asset DiaSymReader.dll
Standard Path %windir%\Microsoft.NET\
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: DiaSymReader.dll (DLL)
$Targets = 'DiaSymReader.dll'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Unlikely

ASP.NET services may be affected

Internal Work Notes

EOL .NET versions are vulnerable to buffer over-read, recompilation and redeployment of self-contained applications required

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Microsoft Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.