Microsoft issued yet another warning that threat actors are continuing to actively exploit systems unpatched against the ZeroLogon privilege escalation vulnerability in the Netlogon Remote Protocol (MS-NRPC). On Windows Server devices where the vulnerability was not patched, attackers can spoof a domain controller account to steal domain credentials and take over the entire domain following successful exploitation.
Experts Comments
Dot Your Expert Comments
Only for registered and approved experts. Please register before providing comments. Register here
Linkedin Message
@Adam Laub, CMO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Because non-Windows or homegrown applications and resources may not be able to leverage secure connections via Netlogon at this time...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-expert-re-microsoft-warns-again-about-critical-zerologon-vulnerability
Facebook Message
@Adam Laub, CMO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Because non-Windows or homegrown applications and resources may not be able to leverage secure connections via Netlogon at this time...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-expert-re-microsoft-warns-again-about-critical-zerologon-vulnerability