Vulnerability Name: | CCN-102206 | ||||||
Published: | 2015-04-13 | ||||||
Updated: | 2015-04-13 | ||||||
Summary: | Microsoft Windows could allow a remote authenticated attacker to obtain sensitive information, caused by the use of multiple HTTP requests for various features by multiple API functions. By intercepting the requests and redirecting the victim to a malicious SMB server, an attacker could exploit this vulnerability to obtain another user's credentials in an encrypted format.
Note: This vulnerability is also known as "Redirect to SMB". | ||||||
CVSS v3 Severity: | 4.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N)
| ||||||
CVSS v2 Severity: | 6.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:N/A:N) 5.1 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:N/A:N/E:U/RL:W/RC:C)
| ||||||
Vulnerability Consequences: | Obtain Information | ||||||
References: | Source: CCN Type: US-CERT VU#672268 Microsoft Windows NTLM automatically authenticates via SMB when following a file:// URL Source: CCN Type: Microsoft Web site Windows Source: XF Type: UNKNOWN ms-win-smb-info-disc(102206) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |