Vulnerability Details : CVE-2007-1692
The default configuration of Microsoft Windows uses the Web Proxy Autodiscovery Protocol (WPAD) without static WPAD entries, which might allow remote attackers to intercept web traffic by registering a proxy server using WINS or DNS, then responding to WPAD requests, as demonstrated using Internet Explorer. NOTE: it could be argued that if an attacker already has control over WINS/DNS, then web traffic could already be intercepted by modifying WINS or DNS records, so this would not cross privilege boundaries and would not be a vulnerability. It has also been reported that DHCP is an alternate attack vector.
Exploit prediction scoring system (EPSS) score for CVE-2007-1692
Probability of exploitation activity in the next 30 days: 64.16%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-1692
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2007-1692
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-1692
-
http://news.com.com/Windows+weakness+can+lead+to+network+traffic+hijacks/2100-1002_3-6170229.html
-
http://support.microsoft.com/kb/934864
-
http://www.vupen.com/english/advisories/2007/1115
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/33244
-
http://archives.neohapsis.com/archives/isn/2007-q1/0418.html
-
http://isc.sans.org/diary.html?storyid=2517
Products affected by CVE-2007-1692
- cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:2000:*:small_business_server:*:*:*:*:*