Home / Vulnerabilities / CVE-2020-1472
MEDIUM SEVERITY Ransomware Linked
CVE-2020-1472 Microsoft · Netlogon

Microsoft Netlogon Privilege Escalation Vulnerability

Critical Threat Advisory: This vulnerability is documented in active Ransomware campaigns. Immediate remediation required.

Technical Severity

CVSS v3.1 Metrics

MEDIUM
5.5 / 10
Minimal Risk Critical
Vector Specification
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
Exploitation Likelihood

EPSS Prediction

94.38 %
Predictive Probability
Percentile Rank
100.0 th

Documented as more likely to be exploited than 100.0% of known CVEs.

Detection Date

Nov 03, 2021

Remediation Due

May 03, 2022

CISA Catalog Active

Threat Analysis

Microsoft's Netlogon Remote Protocol (MS-NRPC) contains a privilege escalation vulnerability when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller. An attacker who successfully exploits the vulnerability could run a specially crafted application on a device on the network. The vulnerability is also known under the moniker of Zerologon.

Remediation Directive

Apply updates per vendor instructions.

External Intelligence