Описание
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
FAQ
What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could impersonate the group Managed Service Account (gMSA) to perform actions or access resources over the network.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2012 | ||
Windows Server 2012 (Server Core installation) | ||
Windows 8.1 for 32-bit systems | ||
Windows 8.1 for x64-based systems | ||
Windows Server 2012 R2 | ||
Windows RT 8.1 | ||
Windows Server 2012 R2 (Server Core installation) | ||
Windows 10 for 32-bit Systems | ||
Windows 10 for x64-based Systems | ||
Windows Server 2016 |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
Older Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 61%
0.00421
Низкий
7.8 High
CVSS3
Связанные уязвимости
CVSS3: 7.8
nvd
больше 2 лет назад
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
CVSS3: 7.8
github
больше 2 лет назад
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability.
CVSS3: 7.8
fstec
больше 2 лет назад
Уязвимость службы Local Security Authority (LSA) операционных систем Microsoft Windows, позволяющая нарушителю повысить свои привилегии
EPSS
Процентиль: 61%
0.00421
Низкий
7.8 High
CVSS3