Critical vulnerability in Windows! Update immediately!

Security researchers have released exploits for the vulnerability of Windows Zerologon CVE-2020-1472 that allow a hacker to gain control of a Windows domain.

As part of the Patch Tuesday, August 2020, security updates, Microsoft fixed a critical security vulnerability with a 10/10 rating known as “CVE-2020-1472 | Netlog Elevation of Privilege Vulnerability".

After successfully exploiting this vulnerability, attackers can upgrade their privileges to a domain, and become full-fledged administrators.

The company Secura, which discovered this vulnerability, released a detailed description of the vulnerability, which it named Zerologon.

When one συνδέει μια συσκευή Windows σε έναν domain, the Netlogon Remote (MS-NRPC) via RPC to communicate with the controller and authenticate the user.

If a user logs in with the correct credentials, the domain controller tells the device to enable authentication with the appropriate permissions. Those who have the wrong credentials will obviously not be able to log in.

Because authentication attempts are critical, Windows sends authentication requests over an encrypted, secure s RPC

Secura researcher Tom Tervoort has discovered that it is possible to force domain controllers to return an unencrypted RPC communication when executing authentication requests.

After insecure RPC communication returned, Tervoort could use a flaw in the Netlogon AES-CFB8 encryption trading algorithm to try to forge a successful connection.

In Tervoort tests, it took an average of 256 attempts to forge a successful connection.

This manipulation can deceive a device and connect the user to the system as a domain administrator.

 

Once a hacker gains administrator rights on the network, he gains full access to the domain controller. So it can change users' passwords and execute any command it wishes.

What makes this vulnerability so frightening is that an attacker does not even need credentials on the domain but can forge them to make any login attempt successful.

Rich Warren of the NCC Group and many others released various PoCs yesterday that allow you to gain domain administrator privileges in ten seconds.

As fixing a vulnerability in Zerologon could cause some devices to be authenticated incorrectly, Microsoft has begun repairing it in two steps.

The first phase was released on August 11 in the form of an update that prevents Windows Active Directory domain controllers from using unsecured RPC communication.

This update also records all authentication requests from devices that do not use secure RPC communication.

On February 9, 2021, as part of the Patch Tuesday updates, Microsoft will release a second update that will require all network devices to use secure RPCs unless expressly permitted by an administrator.

It is recommended that Windows administrators develop the first step in updating Active Directory domain controller to protect their network.

Secura has been released a tool which allows you to check if the domain controller you are using is vulnerable to Zerologon vulnerability (CVE-2020-1472).

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).