A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.
To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker who successfully exploited this vulnerability could access another machine using the original user privileges.
The issue has been addressed by changing how NTLM validates network authentication messages.
Metrics
Affected Vendors & Products
References
History
Tue, 20 May 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.To exploit this vulnerability, an attacker could send a specially crafted authentication request, aka 'Microsoft Windows Security Feature Bypass Vulnerability'. | A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages. To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker who successfully exploited this vulnerability could access another machine using the original user privileges. The issue has been addressed by changing how NTLM validates network authentication messages. |
Title | Microsoft Windows Security Feature Bypass Vulnerability | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: microsoft
Published: 2019-06-12T13:49:39
Updated: 2025-05-20T17:50:06.434Z
Reserved: 2018-11-26T00:00:00
Link: CVE-2019-1019

No data.

Status : Modified
Published: 2019-06-12T14:29:03.117
Modified: 2025-05-20T18:15:36.920
Link: CVE-2019-1019

No data.