CVE-2016-0099

HIGH
2016-03-09 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
Added to CISA KEV
Oct 22, 2025 - 00:15 cisa
CISA KEV
PoC Detected
Oct 22, 2025 - 00:15 vuln.today
Public exploit code
Patch Released
Oct 22, 2025 - 00:15 nvd
Patch available
CVE Published
Mar 09, 2016 - 11:59 nvd
HIGH 7.8

Description

The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka "Secondary Logon Elevation of Privilege Vulnerability."

Analysis

Windows Secondary Logon Service improperly processes request handles, allowing local users to escalate privileges to SYSTEM on Windows Vista through Windows 10 via a crafted application.

Technical Context

The CWE-120 buffer overflow in the Secondary Logon Service (seclogon.dll) occurs during handle duplication. An attacker can craft requests that cause the service to impersonate the calling token with elevated privileges, then hijack the impersonation context.

Affected Products

['Microsoft Windows Vista SP2', 'Microsoft Windows 7 SP1', 'Microsoft Windows 8.1', 'Microsoft Windows 10 Gold/1511', 'Microsoft Windows Server 2008/2012/R2', 'Microsoft Windows RT 8.1']

Remediation

Apply Microsoft security update MS16-032. Modern Windows versions have addressed this class of vulnerability. Ensure least-privilege principle is enforced.

Priority Score

209
Low Medium High Critical
KEV: +50
EPSS: +90.4
CVSS: +39
POC: +20

Share

CVE-2016-0099 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy