
Check Point Threat Alert: Badlock Vulnerability

ByDanny Lieblich and Amir Landau, Threat Intelligence & Research
EXECUTIVE SUMMARY
- An elevation-of-privilege vulnerability exists in Microsoft Windows and the Samba interoperability suite for Linux & UNIX.
- Attackers could launch a man-in-the-middle-attack and downgrade the authentication level of DCE/RPC channels, allowing them to impersonate authenticated users.
- Check Point’s latest IPS update protects against this vulnerability with the “Microsoft Windows RPC Authentication Downgrade (MS16-047)” protection.
DESCRIPTION
- A vulnerability exists in Microsoft Windows and in the Samba interoperability suite for Linux & UNIX.
- An attacker could launch a man-in-the-middle (MiTM) attack and downgrade the authentication level of DCE/RPC channels. This would allow the attacker to impersonate authenticated users and gain access to restricted resources.
- This vulnerability occurs because the Security Account Manager (SAM) and Local Security Authority Domain Policy (LSAD) remote protocols accept authentication levels that do not provide adequate protection for information passed on the DCE/RPC channel. This affects all services using DCE/RPC.
- The vulnerability, referred to as Badlock, was assigned CVE number CVE-2016-0128.
CHECK POINT IPS PROTECTION
- Check Point IPS blade protects against this vulnerability with the following protection:
- The protection detects the attacker’s response to the client which causes the client to downgrade the authentication level. Setting the protection to prevent blocks the response.
REFERENCES
- Information shared by the security researchers who discovered the vulnerability:
- Microsoft Security Bulletin MS16-047:
You may also like
Q1 2025 Global Cyber Attack Report from Check Point Software: An Almost 50% Surge in Cyber Threats Worldwide, with a Rise of 126% in Ransomware Attacks
Cyber Attack Surge: In Q1 2025, cyber attacks per organization ...
Unmasking APT29: The Sophisticated Phishing Campaign Targeting European Diplomacy
Executive Summary Check Point Research has been observing a sophisticated ...
Tax Season Scams: How to Protect Yourself from Cyber Security Threats
Tax season is a critical time of year, not only ...
The Weaponization of PDFs : 68% of Cyber attacks begin in your inbox, with 22% of these hiding in PDFs
Over 400 billion PDF files were opened last year, and ...