[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Windows DPAPI (Data Protection Application Programming Interface) Spoofing Vulnerability - CVE-2023-36004

ID: oval:org.secpod.oval:def:95808Date: (C)2023-12-13   (M)2024-03-06
Class: VULNERABILITYFamily: windows




Windows DPAPI (Data Protection Application Programming Interface) Spoofing Vulnerability. To exploit this vulnerability, an attacker would need to launch a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and the target machine. The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a man-in-the-middle (MITM) attack. An unauthorized attacker must wait for a user to initiate a connection.

Platform:
Microsoft Windows 10
Microsoft Windows 11
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Microsoft Windows Server 2022
Microsoft Windows Server
Reference:
CVE-2023-36004
CVE    1
CVE-2023-36004
CPE    25
cpe:/o:microsoft:windows_server_2008:r2:sp1:x64
cpe:/o:microsoft:windows_server_2008:::x64
cpe:/o:microsoft:windows_server_2008:::x86
cpe:/o:microsoft:windows_10:1809::x64
...

© SecPod Technologies