Comment on additional patch for Zerologon from Satnam Narang, Staff Research Engineer at Tenable

Satnam Narang_Staff Research Engineer_Tenable
Satnam Narang_Staff Research Engineer_Tenable

“Today, Microsoft completed its two-phased approach for addressing CVE-2020-1472, also known as Zerologon, a critical elevation of privilege vulnerability in Netlogon. The impact of this vulnerability cannot be simply derived from its CVSSv3 score or its severity rating.

When you consider that Zerologon led the U.S. government to issue an Emergency Directive to all federal agencies to promptly apply the patches for this vulnerability, you start to understand the gravity of the situation. Zerologon provides attackers a reliable way to move laterally once inside a network, giving them the ability to impersonate systems, alter passwords, and gain control over the proverbial keys to the kingdom via the domain controller itself.

For these reasons, Zerologon has been rolled into attacker playbooks, becoming a feather in the cap for post-compromise activity. We’ve also seen reports of Zerologon being favored by ransomware groups like Ryuk during their campaigns. With this second phase being completed today, organizations that have yet to patch Zerologon need to do so immediately.” — Satnam Narang, Staff Research Engineer at Tenable

About Neel Achary 21226 Articles
Neel Achary is the editor of Business News This Week. He has been covering all the business stories, economy, and corporate stories.