A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages. To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker who successfully exploited this vulnerability could access another machine using the original user privileges. The issue has been addressed by changing how NTLM validates network authentication messages.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1019 | vendor advisory |
http://packetstormsecurity.com/files/153639/Microsoft-Windows-HTTP-To-SMB-NTLM-Reflection-Privilege-Escalation.html | third party advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1019 | patch vendor advisory |