CVE-2020-1472: Netlogon Elevation of Privilege Vulnerability (Zerologon)
Patchworx provides patching support for companies in need of immediate assistance in protecting their networks from the risk of CVE-2020-1472: Netlogon Elevation of Privilege Vulnerability (Zerologon). The CVE-2020-1472 vulnerability can be exploited and allow threat actors to gain an escalation in privilege. It is strongly advised for IT professionals to patch for CVE-2020-1472 to protect crucial network infrastructure from being breached.
Threat actors gain an elevation of privilege via Netlogon Remote Protocol (MS-NRPC). By taking advantage of this vulnerability (MS-NRPC), an unauthenticated cybercriminal is able to establish a connection with a domain controller and acquire domain administrator credentials. Once acquired, threat actors are able to run a specialized application that causes your networks to be exposed to additional threats.
Adhering to Microsoft's best security practices, Patchworx will:
- UPDATE your Domain Controllers and ensure they remain up-to-date with patches released August 11, 2020 or later.
- IDENTIFY the devices that are creating vulnerable connections through event log monitoring.
- ADDRESS the non-compliant devices that are creating vulnerable connections.
- ENABLE enforcement mode to address CVE-2020-1472 in your network’s environment.
Deploying updates released on and after August 11, 2020 will resolve security concerns in CVE-2020-1472 for Windows devices, and Active Directory domains and trusts. The 4-step process outlined above will need to be completed for third-party devices to thoroughly mitigate security issues.
Patchworx is staffed 24x7x365 by all US-based engineers that are ready to help you secure your systems. With the increased activity from cybercriminals targeting critical infrastructure, the threat appears more imminent than ever. Companies need to be proactive at addressing known vulnerabilities as soon as they become aware of them.