Lucene search

K
nessusThis script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.NETLOGON_ZEROLOGON_CVE-2020-1472.NBIN
HistorySep 18, 2020 - 12:00 a.m.

Microsoft Netlogon Elevation of Privilege (Zerologon) (Remote)

2020-09-1800:00:00
This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
132

The Netlogon service on the remote host is vulnerable to the zerologon vulnerability. An unauthenticated, remote attacker can exploit this, by spoofing a client credential to establish a secure channel to a domain controller using the Netlogon remote protocol (MS-NRPC). The attacker can then use this to change the computer’s Active Directory (AD) password, and escalate privileges to domain admin.

In order for this plugin to run, you must disable ‘Only use credentials provided by the user’ in the scanner settings.

Binary data netlogon_zerologon_CVE-2020-1472.nbin
VendorProductVersionCPE
microsoftwindowscpe:/o:microsoft:windows