CVE-2016-3225
HIGH EXPLOITEDMicrosoft Windows 10 - Access Control
Title source: ruleDescription
The SMB server component in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application that forwards an authentication request to an unintended service, aka "Windows SMB Server Elevation of Privilege Vulnerability."
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/45562
metasploit
WORKING POC
GREAT
by FoxGloveSec, breenmachine, decoder, ohpe, phra, lupman · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms16_075_reflection_juicy.rb
metasploit
WORKING POC
NORMAL
by FoxGloveSec, breenmachine, Mumbai · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms16_075_reflection.rb
Scores
CVSS v3
7.8
EPSS
0.2606
EPSS Percentile
96.3%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2018-06-01
CWE
CWE-264
Status
published
Products (10)
microsoft/windows_10
microsoft/windows_10
1511
microsoft/windows_7
microsoft/windows_8.1
microsoft/windows_rt_8.1
microsoft/windows_server_2008
microsoft/windows_server_2008
r2 sp1
microsoft/windows_server_2012
microsoft/windows_server_2012
r2
microsoft/windows_vista
Published
Jun 16, 2016
Tracked Since
Feb 18, 2026