Executive Summary

Informations
Name CVE-2020-1472 First vendor Publication 2020-08-17
Vendor Cve Last vendor Modification 2024-01-19

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact None Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-330 Use of Insufficiently Random Values

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 371
Application 2
Os 5
Os 1
Os 3
Os 1
Os 1
Os 1
Os 1
Os 2
Os 1
Os 1
Os 2

Snort® IPS/IDS

Date Description
2020-12-10 Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt
RuleID : 56290 - Revision : 6 - Type : OS-WINDOWS
2020-10-22 Microsoft Windows NetrServerReqChallenge RPC transport sign and seal disablin...
RuleID : 55802 - Revision : 1 - Type : OS-WINDOWS
2020-10-20 Microsoft Windows Netlogon crafted NetrServerAuthenticate elevation of privil...
RuleID : 55704 - Revision : 2 - Type : OS-WINDOWS
2020-10-20 Microsoft Windows Netlogon crafted NetrServerReqChallenge elevation of privil...
RuleID : 55703 - Revision : 2 - Type : OS-WINDOWS

Metasploit Database

id Description
2020-09-23 Netlogon Weak Cryptographic Authentication

Sources (Detail)

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
Source Url
CERT-VN https://www.kb.cert.org/vuls/id/490028
CONFIRM https://www.synology.com/security/advisory/Synology_SA_20_21
GENTOO https://security.gentoo.org/glsa/202012-24
MISC http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Esca...
https://www.oracle.com/security-alerts/cpuApr2021.html
MLIST http://www.openwall.com/lists/oss-security/2020/09/17/2
https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
N/A https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html
UBUNTU https://usn.ubuntu.com/4510-1/
https://usn.ubuntu.com/4510-2/
https://usn.ubuntu.com/4559-1/

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
Date Informations
2024-02-02 02:13:20
  • Multiple Updates
2024-02-01 12:19:58
  • Multiple Updates
2024-01-19 05:27:56
  • Multiple Updates
2024-01-04 09:27:43
  • Multiple Updates
2023-11-07 21:36:54
  • Multiple Updates
2023-09-05 13:07:52
  • Multiple Updates
2023-09-05 01:19:34
  • Multiple Updates
2023-09-02 13:06:42
  • Multiple Updates
2023-09-02 01:19:52
  • Multiple Updates
2023-08-12 13:11:19
  • Multiple Updates
2023-08-12 01:19:07
  • Multiple Updates
2023-08-11 13:04:33
  • Multiple Updates
2023-08-11 01:19:44
  • Multiple Updates
2023-08-06 13:02:49
  • Multiple Updates
2023-08-06 01:18:58
  • Multiple Updates
2023-08-04 13:03:10
  • Multiple Updates
2023-08-04 01:19:13
  • Multiple Updates
2023-07-14 13:03:11
  • Multiple Updates
2023-07-14 01:19:06
  • Multiple Updates
2023-03-29 02:05:51
  • Multiple Updates
2023-03-28 12:19:20
  • Multiple Updates
2022-10-11 12:56:26
  • Multiple Updates
2022-10-11 01:18:56
  • Multiple Updates
2022-04-26 21:23:40
  • Multiple Updates
2021-08-05 01:37:13
  • Multiple Updates
2021-07-21 17:23:31
  • Multiple Updates
2021-06-15 00:23:08
  • Multiple Updates
2021-05-04 13:46:25
  • Multiple Updates
2021-04-22 02:59:06
  • Multiple Updates
2020-12-24 21:23:16
  • Multiple Updates
2020-12-10 21:23:24
  • Multiple Updates
2020-11-23 09:22:47
  • Multiple Updates
2020-11-19 05:22:50
  • Multiple Updates
2020-10-22 21:23:14
  • Multiple Updates
2020-10-20 21:23:10
  • Multiple Updates
2020-10-06 05:22:53
  • Multiple Updates
2020-10-04 09:22:49
  • Multiple Updates
2020-09-28 17:22:50
  • Multiple Updates
2020-09-26 05:22:47
  • Multiple Updates
2020-09-25 21:23:09
  • Multiple Updates
2020-09-24 21:23:10
  • Multiple Updates
2020-09-24 00:22:51
  • Multiple Updates
2020-09-23 00:22:41
  • Multiple Updates
2020-09-22 05:22:53
  • Multiple Updates
2020-09-21 17:22:51
  • Multiple Updates
2020-09-18 09:22:47
  • Multiple Updates
2020-09-17 21:23:14
  • Multiple Updates
2020-09-17 00:22:53
  • Multiple Updates
2020-09-16 21:23:13
  • Multiple Updates
2020-09-03 01:29:40
  • First insertion