MS15-005: Vulnerability in Network Location Awareness Service Could Allow Security Feature Bypass (3022777)

Medium Nessus Plugin ID 80494


The remote Windows host is affected by a security bypass vulnerability.


The Network Location Awareness (NLA) service on the remote host is affected by a security bypass vulnerability due to a failure to validate whether it is connected to a trusted domain or an untrusted network. This could cause the system to unintentionally configure applications insecurely (e.g. the firewall policy) when connecting to an untrusted network. An attacker on the same network can exploit this by spoofing responses to DNS or LDAP requests made by the targeted system.

Note that Microsoft has no plans to release an update for Windows 2003 even though it is affected by this vulnerability.


Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.

See Also

Plugin Details

Severity: Medium

ID: 80494

File Name: smb_nt_ms15-005.nasl

Version: $Revision: 1.5 $

Type: local

Agent: windows

Published: 2015/01/13

Modified: 2017/07/24

Dependencies: 57033, 13855

Risk Information

Risk Factor: Medium


Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/01/13

Vulnerability Publication Date: 2015/01/13

Reference Information

CVE: CVE-2015-0006

BID: 71930

OSVDB: 116956

MSFT: MS15-005

MSKB: 3022777

IAVB: 2015-B-0004