The SAM and LSAD protocol implementations in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 do not properly establish an RPC channel, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "Windows SAM and LSAD Downgrade Vulnerability" or "BADLOCK."
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.163}

epss

{'score': 0.34582}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.17141}

epss

{'score': 0.163}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2024-08-05T22:08:13.324Z

Reserved: 2015-12-04T00:00:00

Link: CVE-2016-0128

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-04-12T23:59:06.587

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-0128

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.