Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-0317


The Security Account Manager Remote (SAMR) protocol implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2 does not properly determine the user-lockout state, which makes it easier for remote attackers to bypass the account lockout policy and obtain access via a brute-force attack, aka "SAMR Security Feature Bypass Vulnerability."


Published

2014-03-12T05:15:19.897

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.4 (MEDIUM)

CVSSv2 Vector

AV:N/AC:H/Au:N/C:N/I:C/A:N

  • Access Vector: NETWORK
  • Access Complexity: HIGH
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: COMPLETE
  • Availability Impact: NONE
Exploitability Score

4.9

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-20
    CWE-264

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System microsoft windows_server_2003 * Yes
Operating System microsoft windows_server_2008 * Yes
Operating System microsoft windows_server_2008 * Yes
Operating System microsoft windows_server_2012 - Yes
Operating System microsoft windows_server_2012 r2 Yes
Operating System microsoft windows_server_2012 r2 Yes
Operating System microsoft windows_server_2012 r2 Yes
Operating System microsoft windows_vista * Yes
Operating System microsoft windows_xp * Yes
Operating System microsoft windows_xp - Yes

References