How to Buy
This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote Windows host is potentially affected by a privilege
The remote Windows host is potentially affected by a vulnerability in
the way that Active Directory distributes passwords that are
configured using Group Policy preferences. This could allow a remote
attacker to retrieve and decrypt passwords stored with Group Policy
The following group policy preferences extensions are affected :
- Local user and group
- Mapped drives
- Scheduled tasks (Uplevel)
- Scheduled tasks (Downlevel)
- Immediate tasks (Uplevel)
- Immediate tasks (Downlevel)
- Data sources
Note that this update does not remove any existing Group Policy
Objects (GPOs). GPOs using the mentioned group policy preferences will
need to be updated to not distribute passwords.
See also :
Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk factor :
High / CVSS Base Score : 7.4
CVSS Temporal Score : 5.8
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 73984 ()
Bugtraq ID: 67275
CVE ID: CVE-2014-1812
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.