Vulnerability Name:

CVE-2012-0174 (CCN-75128)

Assigned:2011-12-13
Published:2012-05-08
Updated:2018-10-12
Summary:Windows Firewall in tcpip.sys in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly enforce firewall rules for outbound broadcast packets, which allows remote attackers to obtain potentially sensitive information by observing broadcast traffic on a local network, aka "Windows Firewall Bypass Vulnerability."
Per http://technet.microsoft.com/en-us/security/bulletin/ms12-032 "An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability." "In order to use this vulnerability, an attacker would first have to gain access to the local subnet of the target computer. An attacker could then use another vulnerability to acquire information about the target system or execute code on the target system."
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:1.7 Low (CVSS v2 Vector: AV:L/AC:L/Au:S/C:P/I:N/A:N)
1.3 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:S/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
3.4 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2012-0174

Source: OSVDB
Type: UNKNOWN
81730

Source: CCN
Type: SA49114
Microsoft Windows TCP/IP Stack Two Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
49114

Source: CCN
Type: Microsoft Security Bulletin MS12-032
Vulnerability in TCP/IP Could Allow Elevation of Privilege (2688338)

Source: CCN
Type: Microsoft Security Bulletin MS13-018
Vulnerability in TCP/IP Could Allow Denial of Service (2790655)

Source: CCN
Type: Microsoft Security Bulletin MS13-019
Vulnerability in Windows Client/Server Run-time Subsystem (CSRSS) Could Allow Elevation of Privilege (2790113)

Source: CCN
Type: Microsoft Security Bulletin MS13-049
Vulnerability in Kernel-Mode Driver Could Allow Denial of Service (2845690)

Source: CCN
Type: Microsoft Security Bulletin MS13-065
Vulnerability in ICMPv6 could allow Denial of Service (2868623)

Source: CCN
Type: Microsoft Security Bulletin MS13-077
Vulnerability in Windows Service Control Manager Could Allow Elevation of Privilege (2872339)

Source: CCN
Type: Microsoft Security Bulletin MS14-006
Vulnerability in IPv6 Could Allow Denial of Service (2904659)

Source: CCN
Type: Microsoft Security Bulletin MS14-031
Vulnerability in TCP Protocol Could Allow Denial of Service (2962478)

Source: CCN
Type: OSVDB ID: 81730
Microsoft Windows tcpip.sys Outbound Packet Filtering Windows Firewall Bypass

Source: BID
Type: UNKNOWN
53352

Source: CCN
Type: BID-53352
Microsoft Windows Firewall CVE-2012-0174 Security Bypass Vulnerability

Source: SECTRACK
Type: UNKNOWN
1027044

Source: CERT
Type: US Government Resource
TA12-129A

Source: MS
Type: UNKNOWN
MS12-032

Source: XF
Type: UNKNOWN
ms-win-broadcast-sec-bypass(75128)

Source: XF
Type: UNKNOWN
ms-win-broadcast-sec-bypass(75128)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:15160

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_7:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x64:*
  • OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x86:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_vista:-:sp2:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_7:-:*:*:*:*:*:x32:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:15160
    V
    Windows Firewall Bypass Vulnerability
    2012-06-25
    BACK
    microsoft windows 7 *
    microsoft windows 7 - sp1
    microsoft windows 7 - sp1
    microsoft windows server 2008 - sp2
    microsoft windows server 2008 r2
    microsoft windows server 2008 r2 sp1
    microsoft windows vista - sp2
    microsoft windows server 2008 -
    microsoft windows vista - sp2
    microsoft windows vista - sp2
    microsoft windows server 2008 sp2
    microsoft windows server 2008 sp2
    microsoft windows 7 -
    microsoft windows server 2008 - r2
    microsoft windows server 2008 r2
    microsoft windows server 2008
    microsoft windows 7 - sp1
    microsoft windows server 2008 r2 sp1
    microsoft windows server 2008 r2 sp1