SmartStateIndia
News

Satnam Narang, Staff Research Engineer at Tenable discussing Microsoft’s two-phased approach for addressing this vulnerability

Tenable Satnam Narang

“Today, Microsoft completed its two-phased approach for addressing CVE-2020-1472, also known as Zerologon, a critical elevation of privilege vulnerability in Netlogon. The impact of this vulnerability cannot be simply derived from its CVSSv3 score or its severity rating.

When you consider that Zerologon led the U.S. government to issue an Emergency Directive to all federal agencies to promptly apply the patches for this vulnerability, you start to understand the gravity of the situation. Zerologon provides attackers a reliable way to move laterally once inside a network, giving them the ability to impersonate systems, alter passwords, and gain control over the proverbial keys to the kingdom via the domain controller itself.

For these reasons, Zerologon has been rolled into attacker playbooks, becoming a feather in the cap for post-compromise activity. We’ve also seen reports of Zerologon being favored by ransomware groups like Ryuk during their campaigns. With this second phase being completed today, organizations that have yet to patch Zerologon need to do so immediately.”

Related posts

NETGEAR ProAV Sets the New Standard for AV over IP

SSI Bureau

iValue in Association with Pixuate and Mobotix Unveil Combat COVID Solution in Government of Karnataka’s Elevate Program

SSI Bureau

Zendesk launches new easy-to-set-up machine-learning solutions to democratize access to AI

SSI Bureau

Leave a Comment

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More