First published: Wed May 14 2014(Updated: )
The Group Policy implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly handle distribution of passwords, which allows remote authenticated users to obtain sensitive credential information and consequently gain privileges by leveraging access to the SYSVOL share, as exploited in the wild in May 2014, aka "Group Policy Preferences Password Elevation of Privilege Vulnerability."
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1812 is classified as a moderate severity vulnerability.
To remediate CVE-2014-1812, apply the appropriate security updates provided by Microsoft for the affected versions.
CVE-2014-1812 affects Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, Windows 8.1, and various versions of Windows Server.
Yes, CVE-2014-1812 can be exploited by remote authenticated users.
CVE-2014-1812 can lead to unauthorized access to sensitive information as it improperly handles password distribution.