Описание
Windows NTLM Spoofing Vulnerability
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
The user would have to click on a specially crafted URL to be compromised by the attacker.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | ||
Windows Server 2012 | ||
Windows Server 2012 (Server Core installation) | ||
Windows Server 2012 R2 | ||
Windows Server 2012 R2 (Server Core installation) |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 86%
0.02836
Низкий
7.1 High
CVSS3
Связанные уязвимости
CVSS3: 7.1
fstec
12 месяцев назад
Уязвимость протокола сетевой аутентификации NT LAN Manager (NTLM) операционной системы Windows, позволяющая нарушителю проводить спуфинг-атаки
EPSS
Процентиль: 86%
0.02836
Низкий
7.1 High
CVSS3