A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.
To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker who successfully exploited this vulnerability could access another machine using the original user privileges.
The issue has been addressed by changing how NTLM validates network authentication messages.
References
Configurations
Configuration 1 (hide)
|
History
20 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages. To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker who successfully exploited this vulnerability could access another machine using the original user privileges. The issue has been addressed by changing how NTLM validates network authentication messages. |
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/153639/Microsoft-Windows-HTTP-To-SMB-NTLM-Reflection-Privilege-Escalation.html - Third Party Advisory | |
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1019 - Patch, Vendor Advisory |
Information
Published : 2019-06-12 14:29
Updated : 2025-05-20 18:15
NVD link : CVE-2019-1019
Mitre link : CVE-2019-1019
CVE.ORG link : CVE-2019-1019
JSON object : View
Products Affected
microsoft
- windows_server_2016
- windows_rt_8.1
- windows_10
- windows_server_2008
- windows_7
- windows_server_2019
- windows_server_2012
- windows_8.1
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor