CVE-2019-1384Insufficiently Protected Credentials in Microsoft Windows

Severity
9.9CRITICALNVD
EPSS
2.7%
top 14.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 12
Latest updateMay 24

Description

A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.To exploit this vulnerability, an attacker could send a specially crafted authentication request, aka 'Microsoft Windows Security Feature Bypass Vulnerability'.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 3.1 | Impact: 6.0

Affected Packages7 packages

CVEListV5microsoft/windows18 versions+17
NVDmicrosoft/windowsr2, 1803, 1903+2
NVDmicrosoft/windows_105 versions+4
CVEListV5microsoft/windows_server17 versions+16

Patches

🔴Vulnerability Details

2
GHSA
GHSA-g3jj-564j-38qm: A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages2022-05-24
CVEList
CVE-2019-1384: A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages2019-11-12

📋Vendor Advisories

1
Microsoft
Microsoft Windows Security Feature Bypass Vulnerability2019-11-12

🕵️Threat Intelligence

2
Talos
Microsoft Patch Tuesday — Nov. 2019: Vulnerability disclosures and Snort coverage2019-11-12
Talos
Microsoft Patch Tuesday — Nov. 2019: Vulnerability disclosures and Snort coverage2019-11-12
CVE-2019-1384 — Insufficiently Protected Credentials | cvebase