{"uuid": "40364306-92a8-4510-9e5f-c3e3dd146319", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1338", "type": "seen", "source": "https://t.me/information_security_channel/31696", "content": "Microsoft NTLM is the default authentication protocol used on NT 4.0 and earlier Windows versions, now it was replaced with Kerberos ticket-based authentication protocol. Two vulnerabilities CVE 2019-1166 and CVE-2019-1338 discovered in Microsoft NTLM allows attackers to bypass the MIC protection and modify the NTLM message flow along with signing requirement. Microsoft fixed the released [\u2026]\nThe post Microsoft NTLM Vulnerability Let Hackers to Compromise the Network Domain Controller (https://gbhackers.com/microsoft-ntlm/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2019-10-10T02:26:41.000000Z"}