CVE-2016-3213

EUVD-2016-4252
The Web Proxy Auto Discovery (WPAD) protocol implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold and 1511, and Internet Explorer 9 through 11 has an improper fallback mechanism, which allows remote attackers to gain privileges via NetBIOS name responses, aka "WPAD Elevation of Privilege Vulnerability."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
microsoftwindows_10
-
microsoftwindows_7
*
microsoftwindows_8.1
*
microsoftwindows_rt_8.1
*
microsoftwindows_server_2008
*
microsoftwindows_server_2012
-
microsoftwindows_vista
*
𝑥
= Vulnerable software versions
Windows Releases
Platform
Version
Windows 10
(x64, x86)
1511 (x64, x86)
Windows 7
Service Pack 1 (x64, x86)
Service Pack 1 (x64, x86)
Windows 8.1
(x64, x86)
Windows RT 8.1
All
Windows Server 2008
Service Pack 2 (x64, x86)
Service Pack 2 (x64, x86)
Service Pack 2 Server Core (x64, x86)
Windows Server 2008 R2
Service Pack 1 (x64)
Service Pack 1 (x64)
Service Pack 1 Server Core (x64)
Windows Server 2012
Server Core
Standard
Windows Server 2012 R2
Server Core
Standard
Windows Vista
Service Pack 2
Service Pack 2
x64 Edition
x64 Edition
Common Weakness Enumeration