Authentication bypass by spoofing in Microsoft Configuration Manager allows an authorized attacker to perform spoofing over an adjacent network.
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Configuration_manager_2403 | Microsoft | * | 5.00.9128.1037 (excluding) |
| Configuration_manager_2409 | Microsoft | * | 5.00.9132.1031 (excluding) |
| Configuration_manager_2503 | Microsoft | * | 5.0.9135.1013 (excluding) |