5.5 CVE-2020-1472

CISA Kev Catalog Used by Malware Used by Ransomware Patch Exploit
 

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.
https://nvd.nist.gov/vuln/detail/CVE-2020-1472

Categories

CWE-NVD-noinfo

References

af854a3a-2127-422b-91ae-364da2661108 Patch Exploit

http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html
Mailing List Third Party Advisory
http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Esca...
Exploit Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2020/09/17/2
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
Mailing List Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
Patch Vendor Advisory
https://security.gentoo.org/glsa/202012-24
Third Party Advisory
https://usn.ubuntu.com/4510-1/
Third Party Advisory
https://usn.ubuntu.com/4510-2/
Third Party Advisory
https://usn.ubuntu.com/4559-1/
Third Party Advisory
https://www.kb.cert.org/vuls/id/490028
Third Party Advisory US Government Resource
https://www.oracle.com/security-alerts/cpuApr2021.html
Patch Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_20_21
Third Party Advisory

secure@microsoft.com Patch Exploit

http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html
Mailing List Third Party Advisory
http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Esca...
Exploit Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2020/09/17/2
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
Mailing List Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
Patch Vendor Advisory
https://security.gentoo.org/glsa/202012-24
Third Party Advisory
https://usn.ubuntu.com/4510-1/
Third Party Advisory
https://usn.ubuntu.com/4510-2/
Third Party Advisory
https://usn.ubuntu.com/4559-1/
Third Party Advisory
https://www.kb.cert.org/vuls/id/490028
Third Party Advisory US Government Resource
https://www.oracle.com/security-alerts/cpuApr2021.html
Patch Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_20_21
Third Party Advisory


 

CPE

cpe start end
Configuration 1
cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:*:*
Configuration 2
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
Configuration 3
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
Configuration 4
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
Configuration 5
cpe:2.3:a:synology:directory_server:*:*:*:*:*:*:*:* < 4.4.5-0101
Configuration 6
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* < 4.10.18
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* >= 4.11.0 < 4.11.13
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* >= 4.12.0 < 4.12.7
Configuration 7
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Configuration 8
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*


REMEDIATION


Patch

Url
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
https://www.oracle.com/security-alerts/cpuApr2021.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
https://www.oracle.com/security-alerts/cpuApr2021.html


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
https://github.com/dirkjanm/CVE-2020-1472
https://github.com/bb00/zer0dump
https://github.com/NAXG/CVE-2020-1472
https://github.com/thatonesecguy/zerologon-CVE-2020-1472
https://github.com/mstxq17/cve-2020-1472
https://github.com/Fa1c0n35/CVE-2020-1472
https://github.com/CanciuCostin/CVE-2020-1472
https://github.com/0xcccc666/cve-2020-1472_Tool-collection
https://github.com/npocmak/CVE-2020-1472
https://github.com/hectorgie/CVE-2020-1472
https://github.com/t31m0/CVE-2020-1472
https://github.com/WiIs0n/Zerologon_CVE-2020-1472
https://github.com/b1ack0wl/CVE-2020-1472
https://github.com/sho-luv/zerologon
https://github.com/hell-moon/ZeroLogon-Exploit
https://github.com/TheJoyOfHacking/dirkjanm-CVE-2020-1472
https://github.com/carlos55ml/zerologon
https://github.com/RicYaben/CVE-2020-1472-LAB
https://github.com/Akash7350/CVE-2020-1472
https://github.com/whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POC
https://github.com/blackh00d/zerologon-poc

Other Nist (github, ...)

Url
http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Esca...
http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Esca...


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry