As stewards of the lush and vast landscape of security vulnerabilities, we felt obliged to share with you the top trending CVEs of the past month (who's excited for winter to be over?! 😁☀️🌷). Brace yourself! Ok, here we go.
On August 11, 2020, Microsoft released a security update that includes a patch for a severe vulnerability in the NETLOGON protocol CVE-2020-1472. Since no primary technical information was published, the CVE failed to get much attention even though it received a maximum CVSS score of 10.
This vulnerability allows an unauthenticated attacker to access a domain controller, establish a vulnerable Netlogon session, and gain domain administrator privileges.
The vulnerability is critical because the major requirement for a successful exploit is the ability to establish a connection with a domain controller.
Applying the Patch Tuesday update from Microsoft’s Advisory will fix the vulnerability. It enforces a remote procedure call (RPC) in the Netlogon protocol for all Windows devices. Microsoft made a revision to this advisory in February.
Visit the Vicarius Research Center for more information on CVEs and how to remediate them. You can also try a 30-day free trial of our TOPIA solution.
Prefer to listen instead? We got you covered 😏
WFH Do's and Don'ts
Kent Weigle April 19, 2021Strengthening your WFH Cyber Hygiene
Kent Weigle April 19, 2021WFH Security Survival Guide
Kent Weigle April 15, 2021What to Expect on Patch Tuesday
Kent Weigle March 03, 2021MICROSOFT ANNOUNCES PLANS TO TERMINATE PATCH TUESDAY; SECURITY TEAMS REJOICE
Kent Weigle March 31, 2021