Netlogon privilege escalation in Microsoft products - CVE-2016-3300

 

Netlogon privilege escalation in Microsoft products - CVE-2016-3300

Published: August 10, 2016 / Updated: February 2, 2017


Vulnerability identifier: #VU292
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-3300
CWE-ID: CWE-255
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Microsoft
Affected software:
Windows
Windows RT
Windows Server

Detailed vulnerability description

The vulnerability allows a local user gain elevated privileges on vulnerable system.

The vulnerability exists due to Windows Netlogon service incorrectly handles secure communication to a domain controller. A local attacker can run arbitrary code on the vulnerable system with elevated privileges.

Successful exploitation of this vulnerability will allow a local user to elevate privileges on the system, joined to Windows Server 2012 or Windows Server 2012 R2 domain controller.


How to mitigate CVE-2016-3300


Sources