CVE-2016-0128

MEDIUM

Description

The SAM and LSAD protocol implementations in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 do not properly establish an RPC channel, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "Windows SAM and LSAD Downgrade Vulnerability" or "BADLOCK."

References

http://badlock.org/

http://www.securitytracker.com/id/1035534

https://bto.bluecoat.com/security-advisory/sa122

https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-047

https://www.kb.cert.org/vuls/id/813296

https://www.samba.org/samba/security/CVE-2016-2118.html

Details

Source: MITRE

Published: 2016-04-12

Updated: 2019-09-27

Type: CWE-254

Risk Information

CVSS v2.0

Base Score: 5.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Impact Score: 4.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 6.8

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

Impact Score: 5.2

Exploitability Score: 1.6

Severity: MEDIUM