CVE-2020-1472

5.5 MEDIUM

📋 TL;DR

CVE-2020-1472 (Zerologon) is a critical authentication bypass vulnerability in Microsoft's Netlogon protocol that allows unauthenticated attackers to gain domain administrator privileges. It affects Windows domain controllers running vulnerable versions. Attackers can exploit this to completely compromise Active Directory domains.

💻 Affected Systems

Products:
  • Windows Server
Versions: Windows Server 2008 R2 through Windows Server 2019
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects domain controllers. Client versions of Windows are not vulnerable, but all domain controllers running affected Windows Server versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete domain compromise with attacker gaining domain administrator privileges, allowing them to create new accounts, modify existing accounts, steal credentials, and deploy malware across the entire domain.

🟠

Likely Case

Attackers gain domain administrator access and establish persistence in the network, leading to data theft, ransomware deployment, or lateral movement across the entire organization.

🟢

If Mitigated

With proper patching and enforcement mode enabled, the vulnerability is completely mitigated with no impact.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires network access to a domain controller, many organizations expose domain controllers to the internet or have VPN-connected attackers who can reach them.
🏢 Internal Only: HIGH - Any attacker with internal network access (including compromised workstations, malicious insiders, or lateral movement from other breaches) can exploit this to gain domain admin privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public proof-of-concept exploits are available, and the vulnerability has been actively exploited in the wild. Exploitation requires no authentication and can be automated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: August 2020 security updates and later

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472

Restart Required: Yes

Instructions:

1. Apply August 2020 or later security updates to all domain controllers. 2. Enable enforcement mode via registry key or group policy. 3. Monitor for non-compliant devices and remediate. 4. Complete the phased rollout as described in Microsoft's guidance.

🔧 Temporary Workarounds

Enable Netlogon secure channel enforcement

windows

Enforces secure RPC usage for Netlogon to prevent exploitation

reg add "HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters" /v FullSecureChannelProtection /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Segment network to restrict access to domain controllers from untrusted networks
  • Implement strict network monitoring for Netlogon protocol anomalies and failed authentication attempts

🔍 How to Verify

Check if Vulnerable:

Use the official Microsoft Zerologon detection script or third-party tools like Mimikatz's zerologon_tester to test domain controllers

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Check that August 2020 or later updates are installed and verify FullSecureChannelProtection registry value is set to 1

📡 Detection & Monitoring

Log Indicators:

  • Event ID 5829 in Netlogon logs indicating secure channel failures
  • Multiple failed Netlogon authentication attempts from single source
  • Unexpected domain controller password changes

Network Indicators:

  • Unencrypted Netlogon RPC traffic to domain controllers
  • Suspicious Netlogon protocol sequences from non-domain joined systems

SIEM Query:

source="*security*" event_id=5829 OR (source="*netlogon*" AND "secure channel")

🔗 References

📤 Share & Export