Vulnerability Description
The Netlogon service in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT 8.1 improperly establishes secure communications channels, which allows local users to gain privileges by leveraging access to a domain-joined machine, aka "Netlogon Elevation of Privilege Vulnerability."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 8.1 | - |
| Microsoft | Windows Rt 8.1 | - |
| Microsoft | Windows Server 2012 | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/92296Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1036576Third Party AdvisoryVDB Entry
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-10PatchVendor Advisory
- http://www.securityfocus.com/bid/92296Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1036576Third Party AdvisoryVDB Entry
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-10PatchVendor Advisory
FAQ
What is CVE-2016-3300?
CVE-2016-3300 is a vulnerability with a CVSS score of 7.8 (HIGH). The Netlogon service in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT 8.1 improperly establishes secure communications channels, which allows local users to gain privileges by...
How severe is CVE-2016-3300?
CVE-2016-3300 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-3300?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 8.1, Microsoft Windows Rt 8.1, Microsoft Windows Server 2012.