First published: Wed Mar 09 2016(Updated: )
The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka "Secondary Logon Elevation of Privilege Vulnerability."
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Vista | =sp2 | |
Windows 10 | ||
Windows 10 | =1511 | |
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0099 has a critical severity rating, indicating a high potential for exploitation.
To fix CVE-2016-0099, you should install the latest security update provided by Microsoft for the affected Windows versions.
CVE-2016-0099 affects various Microsoft Windows systems, including Windows Vista, Windows 7, Windows 8.1, Windows 10, and Windows Server editions.
Exploiting CVE-2016-0099 allows local users to gain elevated privileges on the affected systems.
Yes, Microsoft released patches addressing CVE-2016-0099 in their security updates.