CVE-2016-3213
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
16/06/2016
Last modified:
12/04/2025
Description
The Web Proxy Auto Discovery (WPAD) protocol implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold and 1511, and Internet Explorer 9 through 11 has an improper fallback mechanism, which allows remote attackers to gain privileges via NetBIOS name responses, aka "WPAD Elevation of Privilege Vulnerability."
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securitytracker.com/id/1036096
- http://www.securitytracker.com/id/1036104
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-063
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-077
- http://www.securitytracker.com/id/1036096
- http://www.securitytracker.com/id/1036104
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-063
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-077