6.2
CVSSv3

CVE-2016-0049

Published: 10/02/2016 Updated: 30/10/2018
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.2 | Impact Score: 3.6 | Exploitability Score: 2.5
VMScore: 215
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Kerberos in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 does not properly validate password changes, which allows remote malicious users to bypass authentication by deploying a crafted Key Distribution Center (KDC) and then performing a sign-in action, aka "Windows Kerberos Security Feature Bypass."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2012 -

microsoft windows 8.1

microsoft windows 10 -

microsoft windows server 2012 r2

microsoft windows 10 1511

microsoft windows server 2008 r2

microsoft windows vista

microsoft windows 7

microsoft windows server 2008

Exploits

# Exploit Title: Windows Kerberos Security Feature Bypass # Date: 12-02-2016 # Exploit Author: Nabeel Ahmed # Tested on: Windows 7 Professional (x32/x64) # CVE : CVE-2016-0049 # Category: Local Exploit 1) Prerequisites: - Standard Windows 7 Fully patched and member of an existing domain - BitLocker enabled without PIN or USB key - Passwor ...
Windows kerberos security feature bypass exploit that leverages the vulnerability discussed in MS16-014 ...

Github Repositories

Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049

Note; this repository makes references to external repositories (known as Git submodules) After cloning this repository, please make sure to run the following commands to clone those submodules: git submodule init git submodule update BlueBox BlueBox is a collection of scripts and configurations for the automated exploitation of MS15-12