This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
The remote Windows host has a privilege elevation vulnerability in a
system-provided communications driver.
The remote host has an unspecified privilege elevation vulnerability
in NDProxy.sys, a system-provided communications driver. Successful
exploitation of this vulnerability could allow an attacker to run
arbitrary code in kernel mode. Additionally, the attacker could view,
change or even delete data, as well as install programs and/or create
new accounts with full administrative rights.
See also :
Apply the workaround referenced in Microsoft Security Advisory
(2914486). This workaround will cause certain services that rely on
Windows Telephony Application Programming Interfaces (TAPI) to not
function. Refer to the advisory for more information.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 6.8
Public Exploit Available : true