Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-1019Sensitive Information Exposure in Microsoft Windows 10 Version 1507

Severity
8.5HIGHNVD
EPSS
2.8%
top 13.90%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 12
Latest updateMay 24

Description

A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages. To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker who successfully exploited this vulnerability could access another machine using the original user privileges. The issue has been addressed by changing how NTLM validates network authentication messages.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 1.8 | Impact: 6.0

Affected Packages22 packages

CVEListV5microsoft/windows_76.1.0publication
CVEListV5microsoft/windows_8.16.3.0publication
CVEListV5microsoft/windows_server_20126.2.9200.0publication
CVEListV5microsoft/windows_server_201610.0.14393.0publication
CVEListV5microsoft/windows_server_201910.0.17763.0publication

Patches

🔴Vulnerability Details

2
GHSA
GHSA-5fqm-f4f4-5vpq: A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages2022-05-24
CVEList
Microsoft Windows Security Feature Bypass Vulnerability2019-06-12

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows 10.0.17134.648 - HTTP -> SMB NTLM Reflection Leads to Privilege Elevation2019-07-12

📋Vendor Advisories

1
Microsoft
Microsoft Windows Security Feature Bypass Vulnerability2019-06-11

💬Community

2
Bugzilla
CVE-2019-18838 envoy: malformed HTTP request without the Host header may cause abnormal termination of the Envoy process2019-11-18
Bugzilla
CVE-2019-17402 exiv2: out-of-bounds read in CiffDirectory::readDirectory due to lack of size check2019-11-18
CVE-2019-1019 — Sensitive Information Exposure | cvebase