CVE-2019-1019
12.06.2019, 14:29
A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages. To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker who successfully exploited this vulnerability could access another machine using the original user privileges. The issue has been addressed by changing how NTLM validates network authentication messages.Enginsight
Vendor | Product | Version |
---|---|---|
microsoft | windows_10 | - |
microsoft | windows_7 | - |
microsoft | windows_8.1 | - |
microsoft | windows_rt_8.1 | - |
microsoft | windows_server_2008 | - |
microsoft | windows_server_2012 | - |
microsoft | windows_server_2016 | - |
microsoft | windows_server_2019 | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration