CVE-2016-0099
The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- December 04, 2015
- Published Date
- March 09, 2016
- Last Updated
- February 10, 2025
- Vendor
- Microsoft
- Product
- Windows
- Description
- The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka "Secondary Logon Elevation of Privilege Vulnerability."
- Tags
- Exploitation
- active
- Technical Impact
- total
windows
cisa
malware
ransomware
metasploit_scanner
CVSS Scores
CVSS v3.1
7.8 - HIGH
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0
7.2
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
SSVC Information
References
https://www.exploit-db.com/exploits/40107/
https://www.exploit-db.com/exploits/39719/
https://www.exploit-db.com/exploits/39809/
http://www.securityfocus.com/bid/84034
http://www.securitytracker.com/id/1035210
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-032
https://www.exploit-db.com/exploits/39574/
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2022-03-03 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms16_032_secondary_logon_handle_privesc.rb | 2025-04-29 11:01:41 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
ms16_032_secondary_logon_handle_privesc
Type: metasploit • Created: Unknown
Metasploit module for CVE-2016-0099
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Exploit Used in Malware
-
Added to KEVIntel
-
Detected by Metasploit