MS09-007: Vulnerability in SChannel Could Allow Spoofing (960225)

high Nessus Plugin ID 35823
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


It may be possible to spoof user identities.


The Secure Channel (SChannel) authentication component included in the remote version of Windows does not sufficiently validate certain Transport Layer Security (TLS) handshake messages to ensure that a client does in fact have access to the private key linked to a certificate used for authentication. An attacker who has access to the public key component of a user's certificate may be able to leverage this issue to authenticate as that user against services such as web servers that use certificate-based authentication or to impersonate that user.


Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista and 2008.

See Also

Plugin Details

Severity: High

ID: 35823

File Name: smb_nt_ms09-007.nasl

Version: 1.29

Type: local

Agent: windows

Published: 3/11/2009

Updated: 11/15/2018

Dependencies: smb_hotfixes.nasl, ms_bulletin_checks_possible.nasl

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 3/10/2009

Vulnerability Publication Date: 3/10/2009

Reference Information

CVE: CVE-2009-0085

BID: 34015

MSFT: MS09-007

MSKB: 960225

CWE: 287