| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.7 | $0-$5k | 0.00 |
Summary
A vulnerability categorized as problematic has been discovered in Microsoft Windows. This impacts an unknown function of the component MS-CHAP Authentication. The manipulation results in credentials management. This vulnerability was named CVE-2009-3677. The attack may be performed from remote. There is no available exploit. It is advisable to upgrade the affected component.
Details
A vulnerability classified as critical has been found in Microsoft Windows (Operating System) (affected version unknown). Affected is an unknown functionality of the component MS-CHAP Authentication. The manipulation with an unknown input leads to a credentials management vulnerability. CWE is classifying the issue as CWE-255. This is going to have an impact on confidentiality, and integrity. CVE summarizes:
The Internet Authentication Service (IAS) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold and SP1, and Server 2008 Gold does not properly verify the credentials in an MS-CHAP v2 Protected Extensible Authentication Protocol (PEAP) authentication request, which allows remote attackers to access network resources via a malformed request, aka "MS-CHAP Authentication Bypass Vulnerability."
The weakness was presented 12/08/2009 with Microsoft as MS09-071 as confirmed bulletin (Technet). The advisory is shared for download at microsoft.com. This vulnerability is traded as CVE-2009-3677 since 10/13/2009. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1552.
As 0-day the estimated underground price was around $25k-$100k. The vulnerability scanner Nessus provides a plugin with the ID 43063 (MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution (974318)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Windows : Microsoft Bulletins. The commercial vulnerability scanner Qualys is able to test this issue with plugin 116750 (Microsoft Internet Authentication Service Could Allow Remote Code Execution (MS09-071)).
Upgrading eliminates this vulnerability. Applying the patch MS09-071 is able to eliminate this problem. The bugfix is ready for download at microsoft.com. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published immediately after the disclosure of the vulnerability. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 9326.
The vulnerability is also documented in the databases at X-Force (54440), Tenable (43063), SecurityFocus (BID 37198†), OSVDB (60833†) and Secunia (SA37543†). See VDB-51073 for similar entry. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.microsoft.com/
- Product: https://www.microsoft.com/en-us/windows
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.1VulDB Meta Temp Score: 8.7
VulDB Base Score: 9.1
VulDB Temp Score: 8.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Credentials managementCWE: CWE-255
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 43063
Nessus Name: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution (974318)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
OpenVAS ID: 901065
OpenVAS Name: Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Patch: MS09-071
TippingPoint: 🔍
McAfee IPS: 🔍
McAfee IPS Version: 🔍
ISS Proventia IPS: 🔍
PaloAlto IPS: 🔍
Fortigate IPS: 🔍
Timeline
10/13/2009 🔍12/08/2009 🔍
12/08/2009 🔍
12/08/2009 🔍
12/08/2009 🔍
12/08/2009 🔍
12/08/2009 🔍
12/08/2009 🔍
12/09/2009 🔍
12/09/2009 🔍
12/16/2009 🔍
03/17/2021 🔍
Sources
Vendor: microsoft.comProduct: microsoft.com
Advisory: MS09-071
Organization: Microsoft
Status: Confirmed
CVE: CVE-2009-3677 (🔍)
GCVE (CVE): GCVE-0-2009-3677
GCVE (VulDB): GCVE-100-4068
OVAL: 🔍
IAVM: 🔍
X-Force: 54440
SecurityFocus: 37198 - Microsoft Protected Extensible Authentication Protocol Authentication Bypass Vulnerability
Secunia: 37543 - Microsoft Windows MS-CHAP Authentication Bypass, Moderately Critical
OSVDB: 60833 - Microsoft Windows Internet Authentication Service Crafted MS-CHAP v2 Message Remote Authentication Bypass
SecurityTracker: 1023291 - Microsoft Internet Authentication Service Bugs Let Remote Authenticated Users Execute Arbitrary Code or Gain Privileges of the Target User
Vulnerability Center: 24327 - [MS09-071] Microsoft Windows IAS MS-CHAP Remote Authentication Bypass Vulnerability, Critical
See also: 🔍
Entry
Created: 12/16/2009 11:05Updated: 03/17/2021 16:40
Changes: 12/16/2009 11:05 (91), 06/07/2017 16:04 (13), 03/17/2021 16:40 (2)
Complete: 🔍
Cache ID: 216:A1E:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.