Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2015-0009Microsoft Windows Server 2008 vulnerability

CWE-2549 documents6 sources
Severity
3.3LOWNVD
EPSS
4.1%
top 11.38%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 11
Latest updateMay 13

Description

The Group Policy Security Configuration policy implementation in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows man-in-the-middle attackers to disable a signing requirement and trigger a revert-to-default action by spoofing domain-controller responses, aka "Group Policy Security Feature Bypass Vulnerability."

CVSS vector

AV:A/AC:L/C:N/I:P/A:NExploitability: 6.5 | Impact: 2.9

Affected Packages1 packages

Patches

🔴Vulnerability Details

1
GHSA
GHSA-qqjj-9hpp-gjjc: The Group Policy Security Configuration policy implementation in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R22022-05-13

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows Server 2012 - 'Group Policy' Security Feature Bypass (MS15-014)2019-10-29

📋Vendor Advisories

2
VMware
VMware vCenter Server updates address an important reflected cross-site scripting issue2016-06-14
VMware
VMware product updates address a critical deserialization vulnerability2015-12-18

🕵️Threat Intelligence

2
Talos
Microsoft Patch Tuesday for February 2015: 56 vulnerabilities fixed2015-02-10
Talos
Microsoft Patch Tuesday for February 2015: 56 vulnerabilities fixed2015-02-10

💬Community

1
Bugzilla
CVE-2015-1493 moodle: Directory Traversal Attack possible through some files serving JS (MSA-15-0009)2015-01-28