Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-3225Microsoft Windows 10 vulnerability

CWE-2649 documents7 sources
Severity
7.8HIGHNVD
EPSS
26.1%
top 3.70%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 16
Latest updateMay 14

Description

The SMB server component in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application that forwards an authentication request to an unintended service, aka "Windows SMB Server Elevation of Privilege Vulnerability."

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

🔴Vulnerability Details

2
GHSA
GHSA-pwj2-59p8-97h2: The SMB server component in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 82022-05-14
VulnCheck
Windows SMB Server Elevation of Privilege Vulnerability2016

💥Exploits & PoCs

3
Exploit-DB
Microsoft Windows - Net-NTLMv2 Reflection DCOM/RPC (Metasploit)2018-10-08
Metasploit
Windows Net-NTLMv2 Reflection DCOM/RPC (Juicy)
Metasploit
Windows Net-NTLMv2 Reflection DCOM/RPC

📋Vendor Advisories

1
Microsoft
Windows SMB Server Elevation of Privilege Vulnerability2016-06-14

🕵️Threat Intelligence

2
Talos
Microsoft Patch Tuesday - June 20162016-06-14
Talos
Microsoft Patch Tuesday - June 20162016-06-14