VID |
26739 |
Severity |
20 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Hotfix (MS15-122, 3105256) for 'Security Update for Kerberos to Address Security Feature Bypass' has not been applied. This security update resolves a security feature bypass in Microsoft Windows. An attacker could bypass Kerberos authentication on a target machine and decrypt drives protected by BitLocker. The bypass can be exploited only if the target system has BitLocker enabled without a PIN or USB key, the computer is domain-joined, and the attacker has physical access to the computer.
Windows Kerberos Security Feature Bypass - CVE-2015-6095 A security feature bypass exists in Windows when Kerberos fails to check the password change of a user signing into a workstation. An attacker could bypass Kerberos authentication on a target machine and decrypt drives protected by BitLocker.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://technet.microsoft.com/en-us/library/security/ms15-122
* Platforms Affected: Windows Vista SP2 Windows Vista x64 SP2 Windows Server 2008 SP2 Windows Server 2008 x64 SP2 Windows 7 SP1 Windows 7 x64 SP1 Windows Server 2008 R2 SP1 Windows Server 2008 R2 x64 SP1 Windows 8 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows 10 |
Recommendation |
Apply the appropriate patch(3105256) for your system, as listed in Microsoft Security Bulletin MS15-122 at https://technet.microsoft.com/en-us/library/security/ms15-122 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2015-6095 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|