Remove Authentication Remove LAN Remove Reference
article thumbnail

Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391)

Tenable

A local, authenticated attacker could exploit this vulnerability to elevate to SYSTEM level privileges. A local, authenticated attacker could exploit this vulnerability to delete files from a system. Exploitation would allow an attacker to obtain a user's NTLMv2 hash, which could then be used to authenticate as that user.

Windows 71
article thumbnail

Microsoft’s September 2023 Patch Tuesday Addresses 61 CVEs (CVE-2023-36761)

Tenable

Successful exploitation of this flaw would allow for the disclosure of New Technology LAN Manager (NTLM) hashes. Successful exploitation of these vulnerabilities requires an attacker to authenticate with LAN-access and have valid credentials for an Exchange user. Each of these vulnerabilities were given CVSSv3 scores of 8.0

LAN 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CVE-2020-27125, CVE-2020-27130, CVE-2020-27131: Pre-Authentication Vulnerabilities in Cisco Security Manager Disclosed

Tenable

As part of his PoC release for CVE-2020-27131, Hauser included a reference to TRA-2017-23 , a vulnerability disclosure from Tenable’s Zero Day Research team from 2017 regarding a deserialization remote code execution vulnerability in Cisco Security Manager and Cisco Prime LAN Management Solution. Proof of concept.

article thumbnail

Microsoft’s February 2024 Patch Tuesday Addresses 73 CVEs (CVE-2024-21351, CVE-2024-21412)

Tenable

Successful exploitation of this flaw would allow an attacker to relay a New Technology LAN Manager Version 2 (NTLMv2) hash against a vulnerable server. In order to exploit this flaw, an attacker would need to be authenticated with LAN-access and have a valid login for an Exchange user.

LAN 130
article thumbnail

The Cable Security Experience

CableLabs

They may attack a customer premises equipment (CPE) device from the network side of the service, typically referred to as the wide area network (WAN) side. They may attack the CPE device from the home network side, or the local area network (LAN) side. These tools are authentication, encryption, and message hashing.

article thumbnail

Microsoft’s August 2024 Patch Tuesday Addresses 88 CVEs

Tenable

and could be abused by an authenticated attacker to bypass server-side request forgery (SSRF) protections in order to leak potentially sensitive information. For more information on this vulnerability, please refer to Tenable Research Advisories TRA-2024-27 and TRA-2024-28 , as well as our blog post.

IPv6 128
article thumbnail

Microsoft’s October 2023 Patch Tuesday Addresses 103 CVEs (CVE-2023-36563, CVE-2023-41763)

Tenable

Successful exploitation could lead to the disclosure of New Technology LAN Manager (NTLM) hashes. To combat this, we recommend reviewing the suggestions from this Cybersecurty and Infrastructure Security Agency (CISA) blog post and the Tenable whitepaper, Password, Authentication and Web Best Practices. and is rated as important.

Windows 119