CVE-2016-0099
HIGH KEV RANSOMWAREMS16-032 Secondary Logon Handle Privilege Escalation
Title source: metasploitDescription
The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka "Secondary Logon Elevation of Privilege Vulnerability."
Exploits (7)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/40107
exploitdb
WORKING POC
VERIFIED
by b33f · powershelllocalwindows
https://www.exploit-db.com/exploits/39719
exploitdb
WORKING POC
VERIFIED
by Google Security Research · localwindows_x86
https://www.exploit-db.com/exploits/39574
metasploit
WORKING POC
NORMAL
by James Forshaw, b33f · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms16_032_secondary_logon_handle_privesc.rb
References (8)
Scores
CVSS v3
7.8
EPSS
0.9043
EPSS Percentile
99.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-03-03
VulnCheck KEV
2018-06-01
InTheWild.io
2022-03-03
ENISA EUVD
EUVD-2016-0137
Ransomware Use
Confirmed
CWE
CWE-120
Status
published
Products (9)
microsoft/windows_10_1507
microsoft/windows_10_1511
microsoft/windows_7
microsoft/windows_8.1
microsoft/windows_server_2008
microsoft/windows_server_2008
r2
microsoft/windows_server_2012
microsoft/windows_server_2012
r2
microsoft/windows_vista
Published
Mar 09, 2016
KEV Added
Mar 03, 2022
Tracked Since
Feb 18, 2026