Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-1472— Netlogon Elevation of Privilege Vulnerability

CVSS 5.5 · Medium KEV · Ransomware EPSS 94.38% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-1472

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Netlogon Elevation of Privilege Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows Netlogon 安全特征问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows Netlogon是美国微软(Microsoft)公司的Windows的一个重要组件,主要功能是用户和机器在域内网络上的认证,以及复制数据库以进行域控备份,同时还用于维护域成员与域之间、域与域控之间、域DC与跨域DC之间的关系。 Microsoft Windows Netlogon 存在安全漏洞。攻击者可以使用 Netlogon 远程协议 (MS-NRPC) 建立与域控制器的易受攻击的 Netlogon 安全通道连接并进行特权提升。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftWindows Server version 2004 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*
MicrosoftWindows Server 2019 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
MicrosoftWindows Server 2019 (Server Core installation) 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
MicrosoftWindows Server, version 1909 (Server Core installation) 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*
MicrosoftWindows Server, version 1903 (Server Core installation) 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*
MicrosoftWindows Server 2016 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
MicrosoftWindows Server 2016 (Server Core installation) 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
MicrosoftWindows Server 2008 R2 Service Pack 1 6.1.0 ~ publication cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 R2 Service Pack 1 (Server Core installation) 6.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 6.2.0 ~ publication cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 (Server Core installation) 6.2.0 ~ publication cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 6.3.0 ~ publication cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.0 ~ publication cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*
MicrosoftWindows Server version 20H2 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*

II. Public POCs for CVE-2020-1472

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/Tobey123/CVE-2020-1472-visualizerPOC Details
2Test tool for CVE-2020-1472https://github.com/SecuraBV/CVE-2020-1472POC Details
3Nonehttps://github.com/cube0x0/CVE-2020-1472POC Details
4PoC for Zerologon - all research credits go to Tom Tervoort of Securahttps://github.com/dirkjanm/CVE-2020-1472POC Details
5Exploit Code for CVE-2020-1472 aka Zerologonhttps://github.com/VoidSec/CVE-2020-1472POC Details
6Exploit for zerologon cve-2020-1472https://github.com/risksense/zerologonPOC Details
7Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.https://github.com/bb00/zer0dumpPOC Details
8CVE-2020-1472漏洞复现过程https://github.com/0xkami/CVE-2020-1472POC Details
9CVE-2020-1472复现流程https://github.com/NAXG/CVE-2020-1472POC Details
10Nonehttps://github.com/R0B1NL1N/CVE-2020-1472POC Details
11PoC for Zerologon (CVE-2020-1472) - Exploithttps://github.com/thatonesecguy/zerologon-CVE-2020-1472POC Details
12Ladon Moudle CVE-2020-1472 Exploit 域控提权神器https://github.com/k8gege/CVE-2020-1472-EXPPOC Details
13CVE-2020-1472https://github.com/jiushill/CVE-2020-1472POC Details
14Zabbix Template to monitor for Windows Event Viewer event's related to Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472. Monitors event ID's 5827, 5828 & 5829. See: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472https://github.com/scv-m/zabbix-template-CVE-2020-1472POC Details
15cve-2020-1472 复现利用及其exphttps://github.com/mstxq17/cve-2020-1472POC Details
16Nonehttps://github.com/Fa1c0n35/CVE-2020-1472POC Details
17Nonehttps://github.com/Fa1c0n35/SecuraBV-CVE-2020-1472POC Details
18CVE-2020-1472 - Zero Logon vulnerability Python implementationhttps://github.com/CanciuCostin/CVE-2020-1472POC Details
19cve-2020-1472_Tool collectionhttps://github.com/0xcccc666/cve-2020-1472_Tool-collectionPOC Details
20[CVE-2020-1472] Netlogon Remote Protocol Call (MS-NRPC) Privilege Escalation (Zerologon)https://github.com/murataydemir/CVE-2020-1472POC Details
21https://github.com/dirkjanm/CVE-2020-1472https://github.com/npocmak/CVE-2020-1472POC Details
22Nonehttps://github.com/victim10wq3/CVE-2020-1472POC Details
23Test script for CVE-2020-1472 for both RPC/TCP and RPC/SMBhttps://github.com/zeronetworks/zerologonPOC Details
24 CVE-2020-1472复现时使用的py文件整理打包https://github.com/sv3nbeast/CVE-2020-1472POC Details
25A simple implementation/code smash of a bunch of other reposhttps://github.com/midpipps/CVE-2020-1472-EasyPOC Details
26Nonehttps://github.com/hectorgie/CVE-2020-1472POC Details
27Nonehttps://github.com/johnpathe/zerologon-cve-2020-1472-notesPOC Details
28Nonehttps://github.com/t31m0/CVE-2020-1472POC Details
29CVE 2020-1472 Script de validación https://github.com/grupooruss/CVE-2020-1472POC Details
30Nonehttps://github.com/striveben/CVE-2020-1472POC Details
31Nonehttps://github.com/Fa1c0n35/CVE-2020-1472-02-POC Details
32CVE-2020-1472https://github.com/Whippet0/CVE-2020-1472POC Details
33POC for checking multiple hosts for Zerologon vulnerabilityhttps://github.com/WiIs0n/Zerologon_CVE-2020-1472POC Details
34Zerologon AutoExploit Tool | CVE-2020-1472https://github.com/Privia-Security/ADZeroPOC Details
35Nonehttps://github.com/Ken-Abruzzi/cve-2020-1472POC Details
36Protect your domain controllers against Zerologon (CVE-2020-1472).https://github.com/rhymeswithmogul/Set-ZerologonMitigationPOC Details
37Nonehttps://github.com/shanfenglan/cve-2020-1472POC Details
38Check for events that indicate non compatible devices -> CVE-2020-1472https://github.com/maikelnight/zerologonPOC Details
39C# Vulnerability Checker for CVE-2020-1472 Aka Zerologonhttps://github.com/CPO-EH/CVE-2020-1472_ZeroLogonCheckerPOC Details
40Nonehttps://github.com/puckiestyle/CVE-2020-1472POC Details
41Nonehttps://github.com/mingchen-script/CVE-2020-1472-visualizerPOC Details
42The following is the outcome of playing with CVE-2020-1472 and attempting to automate the process of gaining a shell on the DChttps://github.com/JayP232/The_big_ZeroPOC Details
43Nonehttps://github.com/b1ack0wl/CVE-2020-1472POC Details
44Nonehttps://github.com/SaharAttackit/CVE-2020-1472POC Details
45zerologon script to exploit CVE-2020-1472 CVSS 10/10https://github.com/wrathfulDiety/zerologonPOC Details
46quick'n'dirty automated checks for potential exploitation of CVE-2020-1472 (aka ZeroLogon), using leading artifects in determining an actual exploitation of CVE-2020-1472. requires admin access to the DCshttps://github.com/YossiSassi/ZeroLogon-Exploitation-CheckPOC Details
47Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool will check, exploit and restore password to original statehttps://github.com/sho-luv/zerologonPOC Details
48Modified the test PoC from Secura, CVE-2020-1472, to change the machine password to nullhttps://github.com/hell-moon/ZeroLogon-ExploitPOC Details
49Exploit Code for CVE-2020-1472 aka Zerologonhttps://github.com/Udyz/ZerologonPOC Details
50Nonehttps://github.com/itssmikefm/CVE-2020-1472POC Details
51Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and SMBv2 Signing.https://github.com/NickSanzotta/zeroscanPOC Details
52Nonehttps://github.com/TheJoyOfHacking/SecuraBV-CVE-2020-1472POC Details
53Nonehttps://github.com/TheJoyOfHacking/dirkjanm-CVE-2020-1472POC Details
54Zero-day-scanning is a Domain Controller vulnerability scanner, that currently includes checks for Zero-day-scanning (CVE-2020-1472), MS-PAR/MS-RPRN and SMBv2 Signing.https://github.com/Anonymous-Family/Zero-day-scanningPOC Details
55Test tool for CVE-2020-1472https://github.com/Anonymous-Family/CVE-2020-1472POC Details
56Set of scripts, to test and exploit the zerologon vulnerability (CVE-2020-1472). https://github.com/carlos55ml/zerologonPOC Details
57CVE-2020-1472 C++https://github.com/Rvn0xsy/ZeroLogonPOC Details
58Tool for mass testing ZeroLogon vulnerability CVE-2020-1472https://github.com/guglia001/MassZeroLogonPOC Details
59Tool for mass testing ZeroLogon vulnerability CVE-2020-1472https://github.com/likeww/MassZeroLogonPOC Details
60Nonehttps://github.com/dr4g0n23/CVE-2020-1472POC Details
61Lab introduction to ZeroLogonhttps://github.com/RicYaben/CVE-2020-1472-LABPOC Details
62Nonehttps://github.com/Akash7350/CVE-2020-1472POC Details
63Zerologon exploit for CVE-2020-1472https://github.com/G0urmetD/Zerologon-CVE-2020-1472POC Details
64This is a combination of the zerologon_tester.py code (https://raw.githubusercontent.com/SecuraBV/CVE-2020-1472/master/zerologon_tester.py) and the tool evil-winrm to get a shell.https://github.com/botfather0x0/ZeroLogon-to-ShellPOC Details
65MS-NRPC (Microsoft NetLogon Remote Protocol)/CVE-2020-1472https://github.com/logg-1/0logonPOC Details
66Nonehttps://github.com/whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POCPOC Details
67Zabbix Template to monitor for Windows Event Viewer event's related to Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472. Monitors event ID's 5827, 5828 & 5829. See: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472https://github.com/okay-scam/zabbix-template-CVE-2020-1472POC Details
68Zabbix Template to monitor for Windows Event Viewer event's related to Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472. Monitors event ID's 5827, 5828 & 5829. See: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472https://github.com/McKinnonIT/zabbix-template-CVE-2020-1472POC Details
69Nonehttps://github.com/JolynNgSC/Zerologon_CVE-2020-1472POC Details
70Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and SMBv2 Signing.https://github.com/B34MR/zeroscanPOC Details
71This is a combination of the zerologon_tester.py code (https://raw.githubusercontent.com/SecuraBV/CVE-2020-1472/master/zerologon_tester.py) and the tool evil-winrm to get a shell.https://github.com/c3rrberu5/ZeroLogon-to-ShellPOC Details
72A script to exploit CVE-2020-1472 (Zerologon)https://github.com/blackh00d/zerologon-pocPOC Details
73This project combines the Zerologon vulnerability exploit (CVE-2020-1472) with Impacket tools for streamlined exploitation and post-exploitation activities. It allows penetration testers to assess and demonstrate the impact of this critical vulnerability in a controlled and authorized environment.https://github.com/TuanCui22/ZerologonWithImpacket-CVE2020-1472POC Details
74Simulation of the Zerologon (CVE-2020-1472) vulnerability attack in Active Directory on Windows Server 2016 and the use of the Trend Micro Deep Security solution to prevent such attacks. https://github.com/PakwanSK/Simulating-and-preventing-Zerologon-CVE-2020-1472-vulnerability-attacks.POC Details
75Nonehttps://github.com/tdevworks/CVE-2020-1472-ZeroLogon-Demo-Detection-MitigationPOC Details
76Explicação e demonstração da vulnerabilidade ZeroLogon (CVE-2020-1472)https://github.com/100HnoMeuNome/ZeroLogon-CVE-2020-1472-labPOC Details
77End-to-end Domain Controller exploitation using Metasploit and Impacket: discovered DC10, exploited Zerologon (CVE-2020-1472), extracted NTLM hashes, gained SYSTEM shell, and established a Meterpreter session. https://github.com/nyambiblaise/Domain-Controller-DC-Exploitation-with-Metasploit-ImpacketPOC Details
78Zerologon (CVE-2020-1472) Proof-of-Concept application - Critical Active Directory vulnerability exploitation tool.https://github.com/mods20hh/ZeroLogon-PoC-DC-PwnPOC Details
79Scripts for a lab environment demonstrating the Zerologon (CVE-2020-1472) vulnerability.https://github.com/commit2main/zerologon-labPOC Details
80Research project exploring the ZeroLogon vulnerability. Includes technical write-up on exploit chains, troubleshooting, and server hardening.https://github.com/JeNilSE/CVE-2020-1472-ZeroLogon-AnalysisPOC Details
81Test tool for CVE-2020-1472https://github.com/bvcyber/CVE-2020-1472POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-1472

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2020-08-17 · 121 CVEs total

CVE-2020-146710.0 CRITICALWindows Hard Link Elevation of Privilege Vulnerability
CVE-2020-15838.8 HIGHMicrosoft Word Information Disclosure Vulnerability
CVE-2020-15048.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-15528.0 HIGHWindows Work Folder Service Elevation of Privilege Vulnerability
CVE-2020-15217.8 HIGHWindows Speech Runtime Elevation of Privilege Vulnerability
CVE-2020-15347.8 HIGHWindows Backup Service Elevation of Privilege Vulnerability
CVE-2020-15337.8 HIGHWindows WalletService Elevation of Privilege Vulnerability
CVE-2020-15317.8 HIGHWindows Accounts Control Elevation of Privilege Vulnerability
CVE-2020-15307.8 HIGHWindows Remote Access Elevation of Privilege Vulnerability
CVE-2020-15297.8 HIGHWindows GDI Elevation of Privilege Vulnerability
CVE-2020-15287.8 HIGHWindows Radio Manager API Elevation of Privilege Vulnerability
CVE-2020-15277.8 HIGHWindows Custom Protocol Engine Elevation of Privilege Vulnerability
CVE-2020-15267.8 HIGHWindows Network Connection Broker Elevation of Privilege Vulnerability
CVE-2020-15257.8 HIGHMedia Foundation Memory Corruption Vulnerability
CVE-2020-15247.8 HIGHWindows Speech Shell Components Elevation of Privilege Vulnerability
CVE-2020-15137.8 HIGHWindows CSC Service Elevation of Privilege Vulnerability
CVE-2020-15167.8 HIGHWindows Work Folders Service Elevation of Privilege Vulnerability
CVE-2020-15157.8 HIGHWindows Telephony Server Elevation of Privilege Vulnerability
CVE-2020-15177.8 HIGHWindows File Server Resource Management Service Elevation of Privilege Vulnerability
CVE-2020-15127.8 HIGHWindows State Repository Service Information Disclosure Vulnerability

Showing top 20 of 121 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-1472

No comments yet


Leave a comment