Domain Controller Zerologon
Dubbed zerologon cve 2020 1472 and discovered by tom tervoort of secura the privilege escalation vulnerability exists due to the insecure usage of aes cfb8 encryption for netlogon sessions allowing remote attackers to establish a connection to the targeted domain controller over netlogon remote protocol ms nrpc.
Domain controller zerologon. 0 domain admin in 10 seconds with zerologon cve 2020 1472. Protecting active directory domain controllers from zerologon. From there they will have free rein to do.
It allows attackers to instantly gain control of the active directory. Microsoft active directory domain controllers are at the heart of the zerologon vulnerability. Domain controllers respond to authentication requests and verify users on computer networks.
The vulnerability dubbed zerologon cve 2020 1472 is a privilege escalation bug with a cvssv3 score of 10 0 and allows a remote attacker to establish a vulnerable netlogon secure channel connection to a domain controller using the netlogon remote protocol ms nrpc and take over windows servers running as domain controllers. An attacker can use zeros for the initialization vector allowing them to take over a domain controller in a matter of seconds. Warning enabling this policy will expose your domain joined devices and your active directory forest which could put them at to risk.
The updates fixing zerologon vulnerability were released in august 2020. Rich warren of ncc group released a poc yesterday that allowed him to achieve domain admin in ten seconds. Cve 2020 1472 aka zerologon affects all supported windows server versions but the danger is highest for servers that function as active directory domain controllers in enterprise networks.
Zerologon is a privilege escalation vulnerability and is. This results in the attacker gaining administrative access and taking full control of the domain controller and therefore the network. Very bad is the short answer.
Actually the patch is a temporary fix. How bad is this vulnerability. The domain controller will require the specified group accounts to use a netlogon secure channel with secure rpc.