An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'.
This indicates an attack attempt to exploit an Elevation of Priviledge on Windows Server Netlogon Service.The vulnerablitiy is due to flaws in a cryptographic authentication protocol that proves the authenticity and identity of a domain-joined computer to a Windows Server Domain Controller. Successful exploitation can lead to an attacker gaining domain admin privileges on the vulnerable server.
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 1903 (Server Core installation)
Windows Server, version 1909 (Server Core installation)
Windows Server, version 2004 (Server Core installation)
Privilege Escalation: Remote attackers can leverage their privileges on vulnerable systems.
Apply the most recent upgrade or patch from the vendor.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Linux(1 tweets) Windows(3 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
Prohacktiv3 | https://github.com/followboy1999/CVE-2022-25365 | Source Prohacktiv3 1627564125713797122 | 2023/02/20 |
Prohacktiv3 | https://twitter.com/Prohacktiv3/status/1627564125713797122/... | Source Prohacktiv3 1627564125713797122 | 2023/02/20 |
ArmeriaVillosa | https://tryhackme.com/room/zer0logon | Source ArmeriaVillosa 1634500732782034946 | 2023/03/11 |
MParis84 | https://tryhackme.com/room/zer0logon | Source MParis84 1634923920485912578 | 2023/03/12 |
Christe05505504 | https://tryhackme.com/room/zer0logon | Source Christe05505504 1642189775007301634 | 2023/04/02 |
List of frequently cited URLs
User | URL | Info Source |
---|---|---|
Prohacktiv3 | github.com | Show Tweet |
Prohacktiv3 | twitter.com | Show Tweet |
ArmeriaVillosa | tryhackme.com | Show Tweet |
MParis84 | tryhackme.com | Show Tweet |
Christe05505504 | tryhackme.com | Show Tweet |
Name | URL |
---|---|
SecuraBV/CVE-2020-1472 | https://github.com/SecuraBV/CVE-2020-1472 |
dirkjanm/CVE-2020-1472 | https://github.com/dirkjanm/CVE-2020-1472 |
risksense/zerologon | https://github.com/risksense/zerologon |
VoidSec/CVE-2020-1472 | https://github.com/VoidSec/CVE-2020-1472 |
k8gege/CVE-2020-1472-EXP | https://github.com/k8gege/CVE-2020-1472-EXP |
mstxq17/cve-2020-1472 | https://github.com/mstxq17/cve-2020-1472 |
cube0x0/CVE-2020-1472 | https://github.com/cube0x0/CVE-2020-1472 |
bb00/zer0dump | https://github.com/bb00/zer0dump |
sv3nbeast/CVE-2020-1472 | https://github.com/sv3nbeast/CVE-2020-1472 |
zeronetworks/zerologon | https://github.com/zeronetworks/zerologon |
Name | URL |
---|---|
SecuraBV/CVE-2020-1472 | github.com |
dirkjanm/CVE-2020-1472 | github.com |
risksense/zerologon | github.com |
VoidSec/CVE-2020-1472 | github.com |
k8gege/CVE-2020-1472-EXP | github.com |
mstxq17/cve-2020-1472 | github.com |
cube0x0/CVE-2020-1472 | github.com |
bb00/zer0dump | github.com |
sv3nbeast/CVE-2020-1472 | github.com |
zeronetworks/zerologon | github.com |