SmartStateIndia
News

Satnam Narang, Staff Research Engineer at Tenable discussing Microsoft’s two-phased approach for addressing this vulnerability

Tenable Satnam Narang

“Today, Microsoft completed its two-phased approach for addressing CVE-2020-1472, also known as Zerologon, a critical elevation of privilege vulnerability in Netlogon. The impact of this vulnerability cannot be simply derived from its CVSSv3 score or its severity rating.

When you consider that Zerologon led the U.S. government to issue an Emergency Directive to all federal agencies to promptly apply the patches for this vulnerability, you start to understand the gravity of the situation. Zerologon provides attackers a reliable way to move laterally once inside a network, giving them the ability to impersonate systems, alter passwords, and gain control over the proverbial keys to the kingdom via the domain controller itself.

For these reasons, Zerologon has been rolled into attacker playbooks, becoming a feather in the cap for post-compromise activity. We’ve also seen reports of Zerologon being favored by ransomware groups like Ryuk during their campaigns. With this second phase being completed today, organizations that have yet to patch Zerologon need to do so immediately.”

Related posts

CheQ expands leadership team to strengthen future growth

SSI Bureau

Hitachi Social Innovation Forum 2021 AMERICAS to Showcase How Data Driven Leaders are Changing the World

SSI Bureau

Aerial Deployment: FTTH through the Air

SSI Bureau

Leave a Comment

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More