Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-3213Microsoft Internet Explorer vulnerability

CWE-2647 documents6 sources
Severity
8.8HIGHNVD
EPSS
78.3%
top 0.97%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 16
Latest updateMay 14

Description

The Web Proxy Auto Discovery (WPAD) protocol implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold and 1511, and Internet Explorer 9 through 11 has an improper fallback mechanism, which allows remote attackers to gain privileges via NetBIOS name responses, aka "WPAD Elevation of Privilege Vulnerability."

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages16 packages

🔴Vulnerability Details

1
GHSA
GHSA-cj7m-368h-qqqf: The Web Proxy Auto Discovery (WPAD) protocol implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows2022-05-14

💥Exploits & PoCs

1
Metasploit
NetBIOS Response "BadTunnel" Brute Force Spoof (NAT Tunnel)

📋Vendor Advisories

1
Microsoft
WPAD Elevation of Privilege Vulnerability2016-06-14

🕵️Threat Intelligence

3
Talos
Microsoft Patch Tuesday - June 20162016-06-14
Talos
Microsoft Patch Tuesday - June 20162016-06-14
Huntress
What Is DLL Hijacking? How to Detect & Prevent It | Huntress
CVE-2016-3213 — Microsoft vulnerability | cvebase