FAQ
How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker on the same subnet as the target system would need to send a specially crafted packet to a server configured as a Network Load Balancing cluster host.
FAQ
According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability? This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network.
Workaround
A workaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. The following workaround might be helpful in your situation: Migrate from Network Load Balancing to Software Load Balancing. Microsoft recommends that customers using Network Load Balancing migrate their deployments to the newer Software Load Balancing solution.