CVE-2016-0128

EUVD-2016-0166
The SAM and LSAD protocol implementations in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 do not properly establish an RPC channel, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "Windows SAM and LSAD Downgrade Vulnerability" or "BADLOCK."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.8 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
Affected Products (NVD)
VendorProductVersion
microsoftwindows_10
-
microsoftwindows_7
*
microsoftwindows_8.1
*
microsoftwindows_rt_8.1
-
microsoftwindows_server_2008
*
microsoftwindows_server_2012
-
microsoftwindows_vista
*
𝑥
= Vulnerable software versions
Windows Releases
Platform
Version
Windows 10
(x64, x86)
1511 (x64, x86)
Windows 7
Service Pack 1 (x64, x86)
Windows 8.1
(x64, x86)
Windows RT 8.1
All
Windows Server 2008
Service Pack 2 (x64, x86)
Service Pack 2 Server Core (x64, x86)
Windows Server 2008 R2
Service Pack 1 (x64)
Service Pack 1 Server Core (x64)
Windows Server 2012
Server Core
Standard
Windows Server 2012 R2
Server Core
Standard
Windows Vista
Service Pack 2
x64 Edition
Common Weakness Enumeration