This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote Windows host is affected by a security feature bypass
A security feature bypass vulnerability exists in Windows due to the
Security Account Manager Remote (SAMR) protocol incorrectly validating
the user lockout state. Remote, authenticated attackers can exploit
this issue to conduct brute force attacks against user passwords.
Note that the host must have network connectivity to a domain
See also :
Microsoft has released a set of patches for Windows 2003, XP, Vista,
2008, 2008 R2, 2012, 2012 R2, and Server Core installation option.
Risk factor :
Medium / CVSS Base Score : 5.8
CVSS Temporal Score : 5.0
Public Exploit Available : false