The Netlogon service in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT 8.1 improperly establishes secure communications channels, which allows local users to gain privileges by leveraging access to a domain-joined machine, aka "Netlogon Elevation of Privilege Vulnerability."
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/92296 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1036576 | Third Party Advisory VDB Entry | 
| https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-101 | Patch Vendor Advisory | 
| http://www.securityfocus.com/bid/92296 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1036576 | Third Party Advisory VDB Entry | 
| https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-101 | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2016-08-09 21:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-3300
Mitre link : CVE-2016-3300
CVE.ORG link : CVE-2016-3300
JSON object : View
Products Affected
                microsoft
- windows_rt_8.1
- windows_8.1
- windows_server_2012
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
