The Group Policy implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly handle distribution of passwords, which allows remote authenticated users to obtain sensitive credential information and consequently gain privileges by leveraging access to the SYSVOL share, as exploited in the wild in May 2014, aka "Group Policy Preferences Password Elevation of Privilege Vulnerability."
History

Mon, 10 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-522
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

kev

{'dateAdded': '2021-11-03'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2025-02-10T20:48:56.761Z

Reserved: 2014-01-29T00:00:00.000Z

Link: CVE-2014-1812

cve-icon Vulnrichment

Updated: 2024-08-06T09:50:11.202Z

cve-icon NVD

Status : Modified

Published: 2014-05-14T11:13:06.630

Modified: 2025-02-10T21:15:11.147

Link: CVE-2014-1812

cve-icon Redhat

No data.