CVE-2020-15931
HIGHNetwrix Account Lockout Examiner < 5.1 - Information Disclosure
Title source: ruleDescription
Netwrix Account Lockout Examiner before 5.1 allows remote attackers to capture the Net-NTLMv1/v2 authentication challenge hash of the Domain Administrator (that is configured within the product in its installation state) by generating a single Kerberos Pre-Authentication Failed (ID 4771) event on a Domain Controller.
Exploits (1)
References (2)
Core 2
Core References
Third Party Advisory x_refsource_misc
https://www.optiv.com/explore-optiv-insights/source-zero/netwrix-account-lockout-examiner-41-disclosure-vulnerability
Vendor Advisory x_refsource_confirm
https://www.netwrix.com/netwrix_reports_vulnerability_in_netwrix_account_lockout_examiner_4_1.html
Scores
CVSS v3
7.5
EPSS
0.0630
EPSS Percentile
91.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-200
Status
published
Products (1)
netwrix/account_lockout_examiner
< 5.1
Published
Oct 20, 2020
Tracked Since
Feb 18, 2026