Microsoft issued a patch Tuesday for a serious privilege escalation vulnerability affecting all versions of Windows for enterprises released since 2007. By exploiting it, an attacker who has compromised a single machine on a network can create a new administrator account for themselves and get control of the entire domain. The vulnerability, assigned the serial number CVE-2017-8563, scores 7.5 on the Common Vulnerability Scoring System, meaning it is rated as “high” severity, the second highest after “critical.” “The vulnerability is in the domain controller,” said Roman Blachman, CTO and co-founder of Preempt Security, whose researchers found the flaw in April and reported it to Microsoft. In a video, Preempt researchers show how they can leverage it to exploit known weaknesses in some of the communications protocols included in Windows NT LAN Manager, or NTLM, and launch an attack technique known as credential relay. The vulnerability, Preempt CEO Ajit Sancheti added, “can be exploited if the attacker has compromised […]
The post Microsoft patches domain-controller vulnerability impacting all Windows versions appeared first on Cyberscoop.
Continue reading Microsoft patches domain-controller vulnerability impacting all Windows versions→