Vendor | Product | Version |
---|---|---|
microsoft | windows_10_1507 | 𝑥 < 10.0.10240.20402 |
microsoft | windows_10_1507 | 𝑥 < 10.0.10240.20402 |
microsoft | windows_10_1607 | 𝑥 < 10.0.14393.6614 |
microsoft | windows_10_1607 | 𝑥 < 10.0.14393.6614 |
microsoft | windows_10_1809 | 𝑥 < 10.0.17763.5329 |
microsoft | windows_10_1809 | 𝑥 < 10.0.17763.5329 |
microsoft | windows_10_1809 | 𝑥 < 10.0.17763.5329 |
microsoft | windows_10_21h2 | 𝑥 < 10.0.19044.3930 |
microsoft | windows_10_21h2 | 𝑥 < 10.0.19044.3930 |
microsoft | windows_10_21h2 | 𝑥 < 10.0.19044.3930 |
microsoft | windows_10_22h2 | 𝑥 < 10.0.19045.3930 |
microsoft | windows_10_22h2 | 𝑥 < 10.0.19045.3930 |
microsoft | windows_10_22h2 | 𝑥 < 10.0.19045.3930 |
microsoft | windows_11_21h2 | 𝑥 < 10.0.22000.2713 |
microsoft | windows_11_21h2 | 𝑥 < 10.0.22000.2713 |
microsoft | windows_11_22h2 | 𝑥 < 10.0.22621.3007 |
microsoft | windows_11_22h2 | 𝑥 < 10.0.22621.3007 |
microsoft | windows_11_23h2 | 𝑥 < 10.0.22631.3007 |
microsoft | windows_11_23h2 | 𝑥 < 10.0.22631.3007 |
microsoft | windows_server_2008 | - |
microsoft | windows_server_2008 | - |
microsoft | windows_server_2012 | - |
microsoft | windows_server_2016 | - |
microsoft | windows_server_2019 | - |
microsoft | windows_server_2022 | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-305 - Authentication Bypass by Primary WeaknessThe authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
- CWE-290 - Authentication Bypass by SpoofingThis attack-focused weakness is caused by improperly implemented authentication schemes that are subject to spoofing attacks.