LATEST CYBER SECURITY NEWS AND VIEWS

Home > News > Microsoft Windows Active Directory Critical Vulnerability (CVE-2020-1472)

Latest news

Microsoft Windows Active Directory Critical Vulnerability (CVE-2020-1472)

Posted on

Exploit Code

Given the nature of the vulnerability and that it is likely that exploits will be released in the coming days, Prism Infosec are making its clients aware of a critical vulnerability affecting Microsoft Windows Active Directory (AD) servers. The vulnerability takes advantage of a weak cryptographic algorithm used in the Netlogon authentication process and is described in CVE-2020-1472. 

A proof of concept has been released for this vulnerability, which one researcher has claimed is straightforward to modify into an actual exploit. The exploit would allow an unauthenticated attacker (typically on an internal on-premise Microsoft Windows network) to escalate privileges to Domain Admin level. 

The vulnerability reportedly affects Microsoft Active Directory running on Microsoft Windows Server 2008R2 – 2019. Prism Infosec recommends ensuring that the August 2020 critical security patches from Microsoft are applied as soon as possible to all Active Directory servers within your domain.

For further details see: –

To discuss how Prism Infosec can help to ensure that your organisation is adequately protected from this attack please use the Get in touch page on this web site or email contact@prisminfosec.com.

FILTER RESULTS

Latest tweets

Phil Robinson, Principal Consultant at @prisminfosec, details how addressing cyber maturity can improve a business’ cybersecurity strategy.
#CyberMaturity #Cybersecurity

Click the link below to discover more⬇️

Congratulations to the following companies who are now certified to #CyberEssentials via our great Certification Bodies: Atlantic Limited via @prisminfosec and Ashbrook Research & Consultancy Ltd via @sericsystems

Sign up to our newsletter

  • Fields marked with an * are mandatory

  • This field is for validation purposes and should be left unchanged.