8.3
CVSSv2

CVE-2015-0008

Published: 11/02/2015 Updated: 29/10/2019
CVSS v2 Base Score: 8.3 | Impact Score: 10 | Exploitability Score: 6.5
VMScore: 835
Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The UNC implementation in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not include authentication from the server to the client, which allows remote malicious users to execute arbitrary code by making crafted data available on a UNC share, as demonstrated by Group Policy data from a spoofed domain controller, aka "Group Policy Remote Code Execution Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows rt -

microsoft windows rt 8.1 -

microsoft windows server 2012 -

microsoft windows server 2008 r2

microsoft windows 7 -

microsoft windows server 2008 -

microsoft windows vista -

microsoft windows 8 -

microsoft windows server 2003 -

microsoft windows server 2012 r2

microsoft windows 8.1 -

Exploits

# Exploit Title: Microsoft Windows Server 2012 - 'Group Policy' Remote Code Execution # Date: 2019-10-28 # Exploit Author: Thomas Zuk # Version: Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, # Windows RT, Windows 81, Windows Server 2012 R2, and Windows RT 81 # Tested o ...
Microsoft Windows Server 2012 suffers from a Group Policy remote code execution vulnerability ...

Recent Articles

Patch now: Design flaw in Windows security allows hackers to own corporate laptops, PCs
The Register • Iain Thomson in San Francisco • 10 Feb 2015

Nine fixes to install, three critical and one super bad

Another month, another Patch Tuesday, but this release has a special sting in the tail: a flaw in the fundamental design of Windows that's taken a year to correct, and is unfixable on Server 2003. The critical blunder allows miscreants to completely take over a domain-configured Windows system if it is connected to a malicious network – wirelessly or wired. Most home users shouldn't be hit by this, as they are not usually domain-configured, but it's a massive pain in the ASCII for IT pros beca...