The SAM and LSAD protocol implementations in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 do not properly establish an RPC channel, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "Windows SAM and LSAD Downgrade Vulnerability" or "BADLOCK."
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: microsoft
Published: 2016-04-12T23:00:00
Updated: 2024-08-05T22:08:13.324Z
Reserved: 2015-12-04T00:00:00
Link: CVE-2016-0128
Vulnrichment
No data.
NVD
Status : Modified
Published: 2016-04-12T23:59:06.587
Modified: 2024-11-21T02:41:07.503
Link: CVE-2016-0128
Redhat
No data.