SOAPwn Vulnerability in .NET Framework Enables Remote Code Execution
Summary
Hide ▲
Show ▼
A critical vulnerability, codenamed SOAPwn, in the .NET Framework allows attackers to achieve remote code execution by manipulating Web Services Description Language (WSDL) imports and HTTP client proxies. The flaw impacts multiple enterprise applications, including Barracuda Service Center RMM, Ivanti Endpoint Manager (EPM), and Umbraco 8. Exploiting SOAPwn can lead to arbitrary file writes and NTLM relay attacks. Microsoft has declined to patch the issue, attributing it to application behavior. The vulnerability was disclosed at the Black Hat Europe security conference by WatchTowr Labs researcher Piotr Bazydlo. Affected vendors have released patches to address the flaw.
Timeline
-
10.12.2025 21:21 1 articles · 4h ago
SOAPwn Vulnerability Disclosed at Black Hat Europe
Researcher Piotr Bazydlo from WatchTowr Labs presented findings on the SOAPwn vulnerability at the Black Hat Europe security conference. The flaw allows attackers to exploit WSDL imports and HTTP client proxies to achieve remote code execution in .NET-based applications. Affected vendors have released patches, but Microsoft has declined to address the issue.
Show sources
- .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL — thehackernews.com — 10.12.2025 21:21
Information Snippets
-
SOAPwn allows attackers to abuse WSDL imports and HTTP client proxies to execute arbitrary code in .NET-based applications.
First reported: 10.12.2025 21:211 source, 1 articleShow sources
- .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL — thehackernews.com — 10.12.2025 21:21
-
The vulnerability can be exploited to achieve arbitrary file writes and NTLM relay attacks.
First reported: 10.12.2025 21:211 source, 1 articleShow sources
- .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL — thehackernews.com — 10.12.2025 21:21
-
Microsoft has declined to patch the issue, stating it stems from application behavior.
First reported: 10.12.2025 21:211 source, 1 articleShow sources
- .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL — thehackernews.com — 10.12.2025 21:21
-
Barracuda Service Center RMM version 2025.1.1 and Ivanti EPM version 2024 SU4 SR1 have released patches for the flaw.
First reported: 10.12.2025 21:211 source, 1 articleShow sources
- .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL — thehackernews.com — 10.12.2025 21:21