MS15-071: Vulnerability in NETLOGON Could Allow Elevation of Privilege (3068457)

low Nessus Plugin ID 84735
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Windows host is affected by a privilege escalation vulnerability.


The remote Windows host is affected by a privilege escalation vulnerability due to the Netlogon service improperly establishing a communications channel to a primary domain controller (PDC). An attacker, with access to the PDC, can exploit this by using a crafted application to create a secure channel to the PDC as a backup domain controller (BDC), possibly allowing access to sensitive credential information.

Note that this vulnerability only affects a server if it is configured as a domain controller.


Microsoft has released a set of patches for Windows 2003, 2008, 2008 R2, 2012, and 2012 R2.

See Also

Plugin Details

Severity: Low

ID: 84735

File Name: smb_nt_ms15-071.nasl

Version: 1.8

Type: local

Agent: windows

Published: 7/14/2015

Updated: 11/22/2019

Dependencies: smb_hotfixes.nasl, ms_bulletin_checks_possible.nasl

Risk Information

CVSS Score Source: CVE-2015-2374


Risk Factor: Medium

Score: 4.2


Risk Factor: Low

Base Score: 3.3

Temporal Score: 2.4

Vector: AV:A/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 7/14/2015

Vulnerability Publication Date: 7/14/2015

Reference Information

CVE: CVE-2015-2374

BID: 75633

MSFT: MS15-071

MSKB: 3068457

IAVA: 2015-A-0173