4.3 Medium
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:A/AC:M/Au:N/C:P/I:P/A:N
6.3 Medium
AI Score
Confidence
High
0.006 Low
EPSS
Percentile
78.8%
The NETLOGON service in Microsoft Windows Server 2003 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2, when a Domain Controller is configured, allows remote attackers to spoof the computer name of a secure channel’s endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, aka “NETLOGON Spoofing Vulnerability.”
packetstormsecurity.com/files/130773/Windows-Pass-Through-Authentication-Methods-Improper-Validation.html
seclists.org/fulldisclosure/2015/Mar/60
www.coresecurity.com/advisories/windows-pass-through-authentication-methods-improper-validation
www.securitytracker.com/id/1031891
docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-027
www.samba.org/samba/history/samba-4.2.10.html