The challenge/nonce prediction attack is feasible due to several factors including that the protocol leaks information that can be used by an attacker to calculate the internal state of the PRNG used to generate challenges.
Windows lets you do challenge/response auth and uses a PRNG to generate the challenge messages. Whaaaa? Alarm bells are kind of going off in my head there.