7.5
CVSSv3

CVE-2020-15931

Published: 20/10/2020 Updated: 21/07/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Netwrix Account Lockout Examiner prior to 5.1 allows remote malicious users to capture the Net-NTLMv1/v2 authentication challenge hash of the Domain Administrator (that is configured within the product in its installation state) by generating a single Kerberos Pre-Authentication Failed (ID 4771) event on a Domain Controller.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

netwrix account lockout examiner

Github Repositories

Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability

CVE-2020-15931 Netwrix Account Lockout Examiner 41 Domain Admin Account Credential Disclosure Vulnerability Vulnerbility Overview Netwrix Account Lockout Examiner (ALE) before 51 allows an unauthenticated, remote adversary to trigger a connection to an attacker-controlled system and capture the NTLMv1/v2 challenge-response of an account with domain administrator privileges T