Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Security researchers have released technical details for the Netlogon Remote Protocol vulnerability (CVE-2020-1472) which affects multiple versions of Windows servers . The vulnerability, dubbed Zerologon, is an elevation of privileges vulnerability; if exploited, threat actors can execute remote code, disable security features, and change computer passwords in Active Directory (AD). The vulnerability was originally released in August 2020 and received a base criticality score of 10 out of 10 .
Due to the release of technical details and the publication of Proof of Concept (PoC) exploit code, exploitation in the wild is expected in near future. Organizations that have not already applied the updates from Microsoft’s August Patch Tuesday are strongly recommended to do so.
What we’re doing about it
What you should do about it
CVE-2020-1472 affects Windows Servers 2008-2019. The vulnerability is due to a flaw in the cryptographic authentication process scheme for the Netlogon Remote Protocol (MS-NRPC).
In order to successfully exploit this vulnerability, insider access or previous compromise must have occurred; allowing the threat actor to use the Netlogon Remote Protocol to connect to a domain controller.
In an attack scenario, this vulnerability would be valuable after the initial compromise of one asset via malware. The threat actor could then pivot to the role of Domain Admin and compromise the entire network.
The update released by Windows in August to address this vulnerability works by enabling secure NPRC (Netlogon signing and sealing) for all Windows servers and clients in the domain. Microsoft plans to release a secondary update for CVE-2020-1472 in February 2021, that will require all Windows and non-Windows devices to use secure Remote Procedure Call (RPC) with Netlogon, unless explicitly added to an exception list .
Affected Windows Servers: