What We Do
How we do it
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
Mar 20, 2023
Exertis and eSentire Partner to Deliver 24/7 Multi-Signal MDR, Digital Forensics & IR Services and Exposure Management to Organisations Across the UK, Ireland, and Europe
Basingstoke, UK– 20 March, 2023. Leading technology distributor, Exertis, announced today that it has bolstered its cybersecurity services, adding eSentire, the Authority in Managed Detection and Response (MDR), to its Enterprise portfolio of offerings. eSentire’s award-winning, 24/7 multi-signal MDR, Digital Forensics & Incident Response (IR), and Exposure Management services will be available…
Read More
e3 Ecosystem
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Learn more
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Security advisories — Sep 23, 2020

CVE-2020-1472 Zerologon Update

2 minutes read
Speak With A Security Expert Now


UPDATE: As of the evening of September 23rd, Microsoft has confirmed that threat actors are exploiting CVE-2020-1472 in attacks in the wild.

The risks posed by CVE-2020-1472 (Zerologon) continues to increase as new Proof-of-Concept (PoC) exploit code has been released. Organizations that have not yet applied the August security updates from Microsoft need to do so as soon as possible to avoid being impacted. On September 18th, eSentire deployed detection for Zerologon to all esLOG customers.

This vulnerability, also known as Zerologon, is a Netlogon elevation of privilege vulnerability, affecting multiple versions of Windows Server [1]. If exploited, threat actors can execute remote code, disable security features, and change computer passwords in Active Directory (AD). eSentire has identified an increase in Proof-of-Concept (PoC) exploit code being publicly released. Exploitation in the wild has not been publicly identified at this time but is expected in the immediate future.

What we’re doing about it

What you should do about it

Additional information

As the severity of this vulnerability is Critical and Proof-of-Concept exploit code is widely available, eSentire has published this second advisory to remind clients to mitigate the vulnerability prior to its use in widespread attacks.

Due to the availability of exploit code and the high impact of successful exploitation, real world attacks are expected in the immediate future. Successful exploitation could lead to elevated privileges (such as domain administrator), making this exploit highly valuable for adversaries with a foothold inside of networks. For additional information on this vulnerability, see eSentire’s previous advisory on the release of Proof-of-Concept (PoC) code and technical details for CVE-2020-1472.

Recent Developments:

CISA Emergency Directive

On Friday September 18th, the Cybersecurity and Infrastructure Security Agency (CISA) issued an Emergency Directive to all US federal agencies relating to the Zerologon vulnerability [2]. Federal agencies were given four days to ensure that all vulnerable domain controllers were fully patched. Emergency Directives are an unusual step for government patch management. The directive was issued as there is a high probability that unpatched organizations will be impacted in the immediate future.

Availability and Efficacy of Exploits

The Threat Intelligence team has observed multiple Proof-of-Concept code releases since September 14th, 2020. The availability of exploit code greatly reduces the cost/complexity of weaponizing this vulnerability. Researchers have made improvements on exploit code, such as removing the requirement to reset passwords during exploitation [3]. Benjamin Delpy, author of the Mimikatz suggested adding an exploit for Zerologon in an update to his popular offensive security tool.


[1] https://www.secura.com/pathtoimg.php?id=2055

[2] https://cyber.dhs.gov/ed/20-04/

[3] https://twitter.com/_dirkjan/status/1307662409436475392

View Most Recent Blogs