Tag
#Windows IKE Extension
**What privileges could be gained by an attacker who successfully exploited the vulnerability?** A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level.
**How could an attacker exploit this vulnerability?** An unauthenticated attacker could send a specially crafted IP packet to a target machine that is running Windows and has IPSec enabled, which could enable a remote code execution exploitation.
**How could an attacker exploit this vulnerability?** An unauthenticated attacker could send a specially crafted IP packet to a target machine that is running Windows and has IPSec enabled, which could enable a remote code execution exploitation.
**Are the any prerequisites to a successful attack?** Yes, only systems with the IPSec service running are vulnerable to this attack.
**Are the any prerequisites to a successful attack?** Yes, only systems with the IPSec service running are vulnerable to this attack.
**Are the any prerequisites to a successful attack?** Yes, only systems with the IPSec service running are vulnerable to this attack.
**Are the any prerequisites to a successful attack?** Yes, only systems with the IPSec service running are vulnerable to this attack.
**Are the any prerequisites to a successful attack?** Yes, only systems with the IPSec service running are vulnerable to this attack.
**Are the any prerequisites to a successful attack?** Yes, only systems with the IPSec service running are vulnerable to this attack.