Vulnerabilities > CVE-2015-6095 - Credentials Management vulnerability in Microsoft products
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
COMPLETE Availability impact
NONE Summary
Kerberos in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles password changes, which allows physically proximate attackers to bypass authentication, and conduct decryption attacks against certain BitLocker configurations, by connecting to an unintended Key Distribution Center (KDC), aka "Windows Kerberos Security Feature Bypass."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 11 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS15-122 |
bulletin_url | |
date | 2015-11-10T00:00:00 |
impact | Security Feature Bypass |
knowledgebase_id | 3105256 |
knowledgebase_url | |
severity | Important |
title | Security Update for Kerberos to Address Security Feature Bypass |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS15-122.NASL |
description | The remote Windows host is affected by a security feature bypass vulnerability in Kerberos due to a failure to check the password change of a user signing into a workstation. A remote attacker can exploit this vulnerability by connecting a workstation to a malicious Kerberos Key Distribution Center (KDC), resulting in the ability to decrypt drives protected by BitLocker. Note that this vulnerability can only be exploited if the target system has BitLocker enabled without a PIN or USB key, and the computer is domain-joined. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 86828 |
published | 2015-11-10 |
reporter | This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/86828 |
title | MS15-122: Security Update for Kerberos to Address Security Feature Bypass (3105256) |