CVE-2016-0051

HIGH
2016-02-10 [email protected]
7.8
CVSS 3.0
Share

CVSS Vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
PoC Detected
Apr 12, 2025 - 10:46 vuln.today
Public exploit code
CVE Published
Feb 10, 2016 - 11:59 nvd
HIGH 7.8

Description

The WebDAV client in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "WebDAV Elevation of Privilege Vulnerability."

Analysis

Microsoft Windows WebDAV client in Vista through Windows 10 contains a local privilege escalation vulnerability. Local attackers can exploit a flaw in the WebDAV Mini-Redirector driver to elevate privileges from standard user to SYSTEM, enabling complete local system compromise.

Technical Context

The WebDAV Mini-Redirector (mrxdav.sys) kernel driver contains a vulnerability that allows a local user to send crafted IOCTL requests or trigger specific WebDAV operations that corrupt kernel memory. Successful exploitation elevates the attacker's process to SYSTEM privileges, the highest privilege level on Windows systems.

Affected Products

['Windows Vista SP2', 'Windows Server 2008 SP2/R2 SP1', 'Windows 7 SP1', 'Windows 8.1', 'Windows Server 2012/R2', 'Windows RT 8.1', 'Windows 10 (1507/1511)']

Remediation

Apply the February 2016 Microsoft security update (MS16-016). If the WebDAV client feature is not required, disable the WebClient service. Implement application control policies to prevent unauthorized exploit execution.

Priority Score

134
Low Medium High Critical
KEV: 0
EPSS: +65.1
CVSS: +39
POC: +20

Share

CVE-2016-0051 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy