CVE-2016-3225

HIGH EXPLOITED

Microsoft Windows 10 - Access Control

Title source: rule

Description

The SMB server component in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application that forwards an authentication request to an unintended service, aka "Windows SMB Server Elevation of Privilege Vulnerability."

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/45562
metasploit WORKING POC GREAT
by FoxGloveSec, breenmachine, decoder, ohpe, phra, lupman · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms16_075_reflection_juicy.rb
metasploit WORKING POC NORMAL
by FoxGloveSec, breenmachine, Mumbai · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms16_075_reflection.rb
patchapalooza WRITEUP
by Ascotbe · local
https://github.com/Ascotbe/Kernelhub

Scores

CVSS v3 7.8
EPSS 0.2606
EPSS Percentile 96.3%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2018-06-01
CWE
CWE-264
Status published
Products (10)
microsoft/windows_10
microsoft/windows_10 1511
microsoft/windows_7
microsoft/windows_8.1
microsoft/windows_rt_8.1
microsoft/windows_server_2008
microsoft/windows_server_2008 r2 sp1
microsoft/windows_server_2012
microsoft/windows_server_2012 r2
microsoft/windows_vista
Published Jun 16, 2016
Tracked Since Feb 18, 2026