Vulnerability Name:

CCN-107184

Published:2014-10-14
Updated:2014-10-14
Summary:Microsoft Windows could allow a local attacker to bypass security restrictions, caused by a failure to account for impersonation levels in the SeTokenIsAdmin function. By executing a specially-crafted program, an attacker could exploit this vulnerability to bypass access restrictions and access power settings with administrator privileges.
CVSS v3 Severity:3.3 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
3.0 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:1.7 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: Google Security Research
Issue 127: Windows 7: Admin Check Bypass in NtPowerInformation

Source: XF
Type: UNKNOWN
ms-windows-powerinfo-sec-bypass(107184)

Source: CCN
Type: Packet Storm Security [08-21-2015]
Windows 7 Admin Check Bypass

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:microsoft:windows_7:-:sp1:-:*:-:-:x32:*
  • OR cpe:/o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*

  • * Denotes that component is vulnerable
    BACK
    microsoft windows 7 - sp1
    microsoft windows 7 * sp1