This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege. To exploit this vulnerability, the attacker would first have to authenticate to the targeted domain-joined system by using valid user credentials. An attacker who successfully exploited this vulnerability could elevate their permissions from unprivileged user account to administrator. The attacker could then create accounts, install programs, or view, change, or delete data. The attacker could then try to elevate privilege locally by executing a specially crafted application that could manipulate NTLM password change requests.
To learn more about the vulnerability, see Microsoft Security Bulletin MS16-137.
To learn more about the vulnerability, see Microsoft Security Bulletin MS16-137.