- 845
- 229
The MS-NRPC (Netlogon Remote Protocol) protocol of Microsoft Windows has a vulnerability called CVE-2020-1472, found in 2020. Stealing a user’s password hash and using it as authentication enables attackers to carry out “pass-the-hash” attacks, which lets them gain unauthorized access to a network. The potential for a hacker to access a network without the user’s knowledge or assistance is what qualifies this vulnerability as a critical bug impacting millions.
In August 2020, Microsoft issued a patch to address this vulnerability. To stop the exploitation of this vulnerability, it’s critical to apply the necessary patches as soon as you can if you’re using a vulnerable version of Microsoft Windows. The good news is that Microsoft Defender can now identify Zerologon. This vulnerability has a CVSS3 score of 10 out of 10.
In August 2020, Microsoft issued a patch to address this vulnerability. To stop the exploitation of this vulnerability, it’s critical to apply the necessary patches as soon as you can if you’re using a vulnerable version of Microsoft Windows. The good news is that Microsoft Defender can now identify Zerologon. This vulnerability has a CVSS3 score of 10 out of 10.
- CVE Published: 08/11/2020
- Severity: Critical
- Affected Software: Zerologon