cve/2019/CVE-2019-1338.md

30 lines
2.2 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-1338](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1338)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=2008%20R2%20for%20Itanium-Based%20Systems%20Service%20Pack%201%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2008%20R2%20for%20x64-based%20Systems%20Service%20Pack%201%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2008%20R2%20for%20x64-based%20Systems%20Service%20Pack%201%20(Core%20installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2008%20for%2032-bit%20Systems%20Service%20Pack%202%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2008%20for%2032-bit%20Systems%20Service%20Pack%202%20(Core%20installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2008%20for%20Itanium-Based%20Systems%20Service%20Pack%202%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2008%20for%20x64-based%20Systems%20Service%20Pack%202%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2008%20for%20x64-based%20Systems%20Service%20Pack%202%20(Core%20installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=7%20for%2032-bit%20Systems%20Service%20Pack%201%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=7%20for%20x64-based%20Systems%20Service%20Pack%201%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Security%20Feature%20Bypass&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
A security feature bypass vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLMv2 protection if a client is also sending LMv2 responses, aka 'Windows NTLM Security Feature Bypass Vulnerability'.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/FDlucifer/Proxy-Attackchain
- https://github.com/bodik/awesome-potatoes
- https://github.com/preempt/ntlm-scanner