CVE-2020-1472

5.5 MEDIUM CISA KEV - Actively Exploited
Published: August 17, 2020 Modified: October 29, 2025

Description

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html
Source: secure@microsoft.com
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html
Source: secure@microsoft.com
Mailing List Third Party Advisory
http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
Source: secure@microsoft.com
Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html
Source: secure@microsoft.com
Exploit Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2020/09/17/2
Source: secure@microsoft.com
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
Source: secure@microsoft.com
Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202012-24
Source: secure@microsoft.com
Third Party Advisory
https://usn.ubuntu.com/4510-1/
Source: secure@microsoft.com
Third Party Advisory
https://usn.ubuntu.com/4510-2/
Source: secure@microsoft.com
Third Party Advisory
https://usn.ubuntu.com/4559-1/
Source: secure@microsoft.com
Third Party Advisory
https://www.kb.cert.org/vuls/id/490028
Source: secure@microsoft.com
Third Party Advisory US Government Resource
https://www.oracle.com/security-alerts/cpuApr2021.html
Source: secure@microsoft.com
Patch Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_20_21
Source: secure@microsoft.com
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2020/09/17/2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://security.gentoo.org/glsa/202012-24
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/4510-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/4510-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/4559-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.kb.cert.org/vuls/id/490028
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
https://www.oracle.com/security-alerts/cpuApr2021.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_20_21
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-1472
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource

35 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.5 / 10.0
EPSS (Exploit Probability)
94.4%
100th percentile
Exploitation Status
Actively Exploited
Remediation due: 2022-05-03

Affected Vendors

canonical debian samba fedoraproject oracle microsoft synology opensuse