CVE-2020-1472

Vulnerability updated a month ago (2024-09-20T19:00:57.327Z)
Download STIX
Preview STIX
CVE-2020-1472, also known as the Zerologon vulnerability, is a critical-severity flaw in Microsoft's Netlogon Remote Protocol. The vulnerability allows attackers to gain administrative access to a Windows domain controller without any authentication, effectively giving them control over a network. This flaw was patched on August 11, 2020, but it has been exploited widely by threat actors, particularly in phishing attempts and ransomware attacks. The rapid adoption of the Zerologon vulnerability significantly increased the speed and efficiency of ransomware attacks in 2020. Specifically, it was used to obtain privileged access to Active Directory and CobaltStrike as the C2 framework. In particular, the RansomHub ransomware's attack chain includes exploiting this vulnerability. In one instance, the FBI found a forensic artifact (exp.exe) on a compromised system that likely exploited the Netlogon vulnerability and connected to a domain controller. Various organizations such as the FBI, CISA, CNMF, NCSC-UK, and others have observed APT groups exploiting this vulnerability along with other ones like the Microsoft Exchange memory corruption vulnerability (CVE-2020-0688). Rhysida actors, for example, leveraged external-facing remote services, the Zerologon vulnerability, and phishing campaigns to gain initial access and persistence within a network. Despite these threats, telemetry data from Vision One identified the Zerologon vulnerability as another potential access vector, further emphasizing its widespread use in cyber attacks.
Description last updated: 2024-09-20T18:16:38.601Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Zerologon is a possible alias for CVE-2020-1472. Zerologon (CVE-2020-1472) is a critical elevation of privilege vulnerability within Microsoft’s Netlogon Remote Protocol. This flaw in software design or implementation allows attackers to bypass authentication mechanisms and alter computer passwords within a domain controller's Active Directory, th
9
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Vulnerability
Exploit
Ransomware
Windows
Phishing
Exploits
exploited
Cuba
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The APT15 Threat Actor is associated with CVE-2020-1472. APT15, also known as Vixen Panda, Nickel, Flea, KE3CHANG, Royal APT, and Playful Dragon, is a threat actor group suspected to be of Chinese origin. The group targets global sectors including trade, economic and financial, energy, and military, aligning with the interests of the Chinese government. IUnspecified
2
The Ransomhub Threat Actor is associated with CVE-2020-1472. RansomHub is a threat actor that emerged as a new group in the cybersecurity landscape in February 2024, following the initial takedown of LockBit. Many former LockBit affiliates seemed to have either started working independently using freely available ransomware source code such as Phobos or alignUnspecified
2
The Rhysida Threat Actor is associated with CVE-2020-1472. Rhysida, a threat actor active since May 2023, has been responsible for numerous high-profile ransomware attacks. The group is known for its use of various ransomware families, including BlackCat, Hello Kitty, Quantum Locker, Rhysida, Zeppelin, and its own eponymous program, to aid in double extortiExploited
2
Source Document References
Information about the CVE-2020-1472 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Trend Micro
a month ago
ESET
a month ago
CISA
2 months ago
InfoSecurity-magazine
3 months ago
DARKReading
4 months ago
CISA
5 months ago
CERT-EU
8 months ago
Securityaffairs
10 months ago
CERT-EU
10 months ago
CERT-EU
10 months ago
Securityaffairs
a year ago
SecurityIntelligence.com
a year ago
CERT-EU
a year ago
Securityaffairs
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
Securityaffairs
a year ago
CERT-EU
a year ago
Securityaffairs
a year ago
CISA
a year ago