U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-1040

Change History

CVE Modified by Microsoft Corporation 5/20/2025 2:15:39 PM

Action Type Old Value New Value
Changed Description
A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection, aka 'Windows NTLM Tampering Vulnerability'.
A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection. An attacker who successfully exploited this vulnerability could gain the ability to downgrade NTLM security features.
To exploit this vulnerability, the attacker would need to tamper with the NTLM exchange. The attacker could then modify flags of the NTLM packet without invalidating the signature.
The update addresses the vulnerability by hardening NTLM MIC protection on the server-side.
Added CVSS V3.1

								
							
							
						
AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
Added Reference

								
							
							
						
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1040
Removed Reference
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1040

								
						
Removed Reference Type
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1040 Types: Patch, Vendor Advisory