Kerberos in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 does not properly validate password changes, which allows remote attackers to bypass authentication by deploying a crafted Key Distribution Center (KDC) and then performing a sign-in action, aka "Windows Kerberos Security Feature Bypass."
Advisories
Source ID Title
EUVD EUVD EUVD-2016-0087 Kerberos in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 does not properly validate password changes, which allows remote attackers to bypass authentication by deploying a crafted Key Distribution Center (KDC) and then performing a sign-in action, aka "Windows Kerberos Security Feature Bypass."
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2024-08-05T22:08:12.704Z

Reserved: 2015-12-04T00:00:00

Link: CVE-2016-0049

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-02-10T11:59:13.580

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-0049

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses