CVE-2020-1472

CVSS V2 High 9.3 CVSS V3 Critical 10
Description
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'.
Overview
  • CVE ID
  • CVE-2020-1472
  • Assigner
  • secure@microsoft.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-08-17T19:15:15
  • Last Modified Date
  • 2022-04-26T17:06:38
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* 1 OR
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* 1 OR
cpe:2.3:a:synology:directory_server:*:*:*:*:*:*:*:* 1 OR 4.4.5-0101
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* 1 OR 4.10.18
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* 1 OR 4.11.0 4.11.13
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* 1 OR 4.12.0 4.12.7
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • CHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 10
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 6
References
Reference URL Reference Tags
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472 Patch Vendor Advisory
http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html Third Party Advisory VDB Entry
https://www.kb.cert.org/vuls/id/490028 Third Party Advisory US Government Resource
http://www.openwall.com/lists/oss-security/2020/09/17/2 Mailing List Third Party Advisory
https://usn.ubuntu.com/4510-1/ Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_20_21 Third Party Advisory
https://usn.ubuntu.com/4510-2/ Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/ Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/ Mailing List Third Party Advisory
https://usn.ubuntu.com/4559-1/ Third Party Advisory
http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202012-24 Third Party Advisory
https://www.oracle.com/security-alerts/cpuApr2021.html Patch Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 06:26:20 Added to TrackCVE
2022-12-04 21:08:26 2020-08-17T19:15Z 2020-08-17T19:15:15 CVE Published Date updated
2022-12-04 21:08:26 2022-04-26T17:06:38 CVE Modified Date updated
2022-12-04 21:08:26 Analyzed Vulnerability Status updated