The Group Policy implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly handle distribution of passwords, which allows remote authenticated users to obtain sensitive credential information and consequently gain privileges by leveraging access to the SYSVOL share, as exploited in the wild in May 2014, aka "Group Policy Preferences Password Elevation of Privilege Vulnerability."
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 10:30:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Tue, 11 Feb 2025 06:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-522
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

kev

{'dateAdded': '2021-11-03'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2025-10-22T00:05:37.525Z

Reserved: 2014-01-29T00:00:00.000Z

Link: CVE-2014-1812

cve-icon Vulnrichment

Updated: 2024-08-06T09:50:11.202Z

cve-icon NVD

Status : Deferred

Published: 2014-05-14T11:13:06.630

Modified: 2025-10-22T01:15:55.620

Link: CVE-2014-1812

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses