Lucene search

K
cve[email protected]CVE-2014-6324
HistoryNov 18, 2014 - 11:59 p.m.

CVE-2014-6324

2014-11-1823:59:02
CWE-264
web.nvd.nist.gov
888
In Wild
2
kerberos
kdc
microsoft
windows
vulnerability
security
admin privilege
cve-2014-6324

5.9 Medium

AI Score

Confidence

Low

9 High

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.972 High

EPSS

Percentile

99.8%

The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka “Kerberos Checksum Vulnerability.”

Affected configurations

NVD
Node
microsoftwindows_7
OR
microsoftwindows_8
OR
microsoftwindows_8.1
OR
microsoftwindows_server_2003sp2
OR
microsoftwindows_server_2008sp2
OR
microsoftwindows_server_2008Matchr2sp1
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
OR
microsoftwindows_vistaMatch-sp2

Social References

More

5.9 Medium

AI Score

Confidence

Low

9 High

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.972 High

EPSS

Percentile

99.8%