"Exploit Released for New Windows Server 'WinReg' NTLM Relay Attack"
"Exploit Released for New Windows Server 'WinReg' NTLM Relay Attack"
Publicly available Proof-of-Concept (PoC) exploit code for a vulnerability in Microsoft's Remote Registry client can be used to take over a Windows domain by downgrading the security of the authentication process. The vulnerability stems from a fallback mechanism in the Windows Registry (WinReg) client implementation that relies on old transport protocols if the Server Message Block (SMB) transport is absent.