Jump to content

ZeroLogon - Microsoft silently patches CVSS 10/10 vulnerability

rcmaehl

Summary

Microsoft secretly patched one of the most severe Windows Vulnerabilities ever last month.

 

Media (Click to Enlarge)

WHYWONTYOUHOTLINK.thumb.png.c4d179b2ebbaeab3acacfc48e20e149e.png

 

Quotes

Quote

Last month Microsoft patched one of the most severe bugs ever reported to the company, an issue that could be abused to easily take over Windows Servers running as domain controllers in enterprise networks. POatched in the August 2020 Patch Tuesday under the identifier of CVE-2020-1472. It was described as an elevation of privilege in Netlogon. The vulnerability received the maximum severity rating of 10, but details were never made public. The team at Secura B.V., a Dutch security firm, has finally lifted the veil from this mysterious bug and published a technical report describing CVE-2020-1472 in greater depth. And per the report, the bug is truly worthy of its 10/10 CVSSv3 severity score. The bug... takes advantage of a weak cryptographic algorithm used in the Netlogon authentication process. This bug allows an attacker to manipulate Netlogon authentication procedures and:

  • impersonate the identity of any computer on a network when trying to authenticate against the domain controller
  • disable security features in the Netlogon authentication process
  • change a computer's password on the domain controller's Active Directory (a database of all computers joined to a domain, and their passwords)

There are limitations to how a Zerologon attack can be used. For starters, it cannot be used to take over Windows Servers from outside the network. An attacker first needs a foothold inside a network. However, when this condition is met, it's literally game over for the attacked company. The entire attack is very fast and can last up to three seconds, at most. In addition, there are no limits to how an attacker can use the Zerologon attack. For example, the attacker could also pose as the domain controller itself and change its password, allowing the hacker to take over the entire corporate network. Patching Zerologon was no easy task for Microsoft, as the company had to modify how billions of devices are connecting to corporate networks, effectively disrupting the operations of countless of companies. This patching process is scheduled to take place over two phases. The first one took place last month, when Microsoft released a temporary fix. This temporary patch made the Netlogon security features (that Zerologon was disabling) mandatory for all Netlogon authentications, effectively breaking Zerologon attacks. Nonetheless, a more complete patch is scheduled for February 2021, just in case attackers find a way around the August patches. Unfortunately, Microsoft anticipates that this later patch will end up breaking authentication on some devices. Secura has not released proof-of-concept code for a weaponized Zerologon attack, but the company expects that these will eventually surface after its report spreads online today.

 

My thoughts

Big Yikes? Mega oof? I don't think I have fresh lingo hot enough to express how bad this is. 10/10 is about as severe as it gets vulnerability wise. Thankfully a patch has been pushed out to everything back to 2008 and server owners are usually quick to update for security patches. Regardless, we may still see some breaches and attacks due to this exploit now that it's essentially public.

 

Sources

ZDNet (quote source)
Microsoft

@leadeater for being lazy

Edited by Spotty
Changed title

PLEASE QUOTE ME IF YOU ARE REPLYING TO ME

Desktop Build: Ryzen 7 2700X @ 4.0GHz, AsRock Fatal1ty X370 Professional Gaming, 48GB Corsair DDR4 @ 3000MHz, RX5700 XT 8GB Sapphire Nitro+, Benq XL2730 1440p 144Hz FS

Retro Build: Intel Pentium III @ 500 MHz, Dell Optiplex G1 Full AT Tower, 768MB SDRAM @ 133MHz, Integrated Graphics, Generic 1024x768 60Hz Monitor


 

Link to comment
Share on other sites

Link to post
Share on other sites

Damn that title hittin me hard tho. I got all those things x10 per square mm on me 😢

Link to comment
Share on other sites

Link to post
Share on other sites

I suspect the various server admins who are members of this forum, (like @leadeater), are busy engaging in internal and external screaming at this. Even with my nigh non-existent networking knowledge i can follow along well enough to realise how insane this is.

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, TempestCatto said:

Damn that title hittin me hard tho. I got all those things x10 per square mm on me 😢

well 0 x 10 is 0 so i'd say your doing pretty good about those

Spoiler

My system is the Dell Inspiron 15 5559 Microsoft Signature Edition

                         The Austrailian king of LTT said that I'm awesome and a funny guy. the greatest psu list known to man DDR3 ram guide

                                                                                                               i got 477 posts in my first 30 days on LinusTechTips.com

 

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, CarlBar said:

I suspect the various server admins who are members of this forum, (like @leadeater), are busy engaging in internal and external screaming at this. Even with my nigh non-existent networking knowledge i can follow along well enough to realise how insane this is.

Nope, we already patched so it was a round of high fives 🎉

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, CarlBar said:

I suspect the various server admins who are members of this forum, (like @leadeater), are busy engaging in internal and external screaming at this. Even with my nigh non-existent networking knowledge i can follow along well enough to realise how insane this is.

I'm hoping they just send us a new domain controller machine.

Link to comment
Share on other sites

Link to post
Share on other sites

6 hours ago, Oshino Shinobu said:

RIP companies using Server 2008 R2 without ESU licensing. 

Oh boy. My last place of work they had over 20 servers still using 2008 R2. I still keep in contact with some of guys I worked with and they managed to only migrate 5 of the 20 servers, only reason is because of Rona. But, I don't know why It has taken them so long.

CPU: AMD Ryzen 5 5600X | CPU Cooler: Stock AMD Cooler | Motherboard: Asus ROG STRIX B550-F GAMING (WI-FI) | RAM: Corsair Vengeance LPX 16 GB (2 x 8 GB) DDR4-3000 CL16 | GPU: Nvidia GTX 1060 6GB Zotac Mini | Case: K280 Case | PSU: Cooler Master B600 Power supply | SSD: 1TB  | HDDs: 1x 250GB & 1x 1TB WD Blue | Monitors: 24" Acer S240HLBID + 24" Samsung  | OS: Win 10 Pro

 

Audio: Behringer Q802USB Xenyx 8 Input Mixer |  U-PHORIA UMC204HD | Behringer XM8500 Dynamic Cardioid Vocal Microphone | Sound Blaster Audigy Fx PCI-E card.

 

Home Lab:  Lenovo ThinkCenter M82 ESXi 6.7 | Lenovo M93 Tiny Exchange 2019 | TP-LINK TL-SG1024D 24-Port Gigabit | Cisco ASA 5506 firewall  | Cisco Catalyst 3750 Gigabit Switch | Cisco 2960C-LL | HP MicroServer G8 NAS | Custom built SCCM Server.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Kisai said:

I'm hoping they just send us a new domain controller machine.

Why, there is a patch so just apply that. Unless there is a reason to replace it?

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Sir Asvald said:

Oh boy. My last place of work they had over 20 servers still using 2008 R2. I still keep in contact with some of guys I worked with and they managed to only migrate 5 of the 20 servers, only reason is because of Rona. But, I don't know why It has taken them so long.

Spoiler

We still have a couple of Server 2003, shhhhh

 

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, leadeater said:
  Reveal hidden contents

We still have a couple of Server 2003, shhhhh

 

 

This isn;t really funny but somehow it still made me smile. Also cool on the high fives.

Link to comment
Share on other sites

Link to post
Share on other sites

Always big yikes when such critical and old vulnerability surfaces. Patched so good.

| Ryzen 7 7800X3D | AM5 B650 Aorus Elite AX | G.Skill Trident Z5 Neo RGB DDR5 32GB 6000MHz C30 | Sapphire PULSE Radeon RX 7900 XTX | Samsung 990 PRO 1TB with heatsink | Arctic Liquid Freezer II 360 | Seasonic Focus GX-850 | Lian Li Lanccool III | Mousepad: Skypad 3.0 XL / Zowie GTF-X | Mouse: Zowie S1-C | Keyboard: Ducky One 3 TKL (Cherry MX-Speed-Silver)Beyerdynamic MMX 300 (2nd Gen) | Acer XV272U | OS: Windows 11 |

Link to comment
Share on other sites

Link to post
Share on other sites

On 9/15/2020 at 9:07 AM, leadeater said:
  Hide contents

We still have a couple of Server 2003, shhhhh

 

WTF?! WHY?!

 

 

CPU: AMD Ryzen 5 5600X | CPU Cooler: Stock AMD Cooler | Motherboard: Asus ROG STRIX B550-F GAMING (WI-FI) | RAM: Corsair Vengeance LPX 16 GB (2 x 8 GB) DDR4-3000 CL16 | GPU: Nvidia GTX 1060 6GB Zotac Mini | Case: K280 Case | PSU: Cooler Master B600 Power supply | SSD: 1TB  | HDDs: 1x 250GB & 1x 1TB WD Blue | Monitors: 24" Acer S240HLBID + 24" Samsung  | OS: Win 10 Pro

 

Audio: Behringer Q802USB Xenyx 8 Input Mixer |  U-PHORIA UMC204HD | Behringer XM8500 Dynamic Cardioid Vocal Microphone | Sound Blaster Audigy Fx PCI-E card.

 

Home Lab:  Lenovo ThinkCenter M82 ESXi 6.7 | Lenovo M93 Tiny Exchange 2019 | TP-LINK TL-SG1024D 24-Port Gigabit | Cisco ASA 5506 firewall  | Cisco Catalyst 3750 Gigabit Switch | Cisco 2960C-LL | HP MicroServer G8 NAS | Custom built SCCM Server.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

16 hours ago, Sir Asvald said:

WTF?! WHY?!

 

 

Because money.
Migrating, especially if it involves purchasing new software (or new 20-50-200k scientific equipment), can be stupidly expensive and time consuming. Mind you, REDACTED isn't ideal, but we have multiple XP and I think one vista machine at work, just not connected to the network.

As #muricaparrotgang's founder, I invite you to join our ranks today.

"My name is Legion 'Murica Parrot Gang, for we are many."

 

(We actually welcome all forms of animated parrot gifs.)

 

The artist formerly known as Aelar_Nailo.

 

Profile Pic designed by the very lovely @Red :)!

Link to comment
Share on other sites

Link to post
Share on other sites

5 hours ago, FakeNSA said:

Because money.
Migrating, especially if it involves purchasing new software (or new 20-50-200k scientific equipment), can be stupidly expensive and time consuming. Mind you, REDACTED isn't ideal, but we have multiple XP and I think one vista machine at work, just not connected to the network.

Of course it will cost a lot of money for new hardware and software. But those servers are probably costing them a lot of money just to keep them running.

 

Damn, what are the uses for the XP and Vista PCs? Special software?

CPU: AMD Ryzen 5 5600X | CPU Cooler: Stock AMD Cooler | Motherboard: Asus ROG STRIX B550-F GAMING (WI-FI) | RAM: Corsair Vengeance LPX 16 GB (2 x 8 GB) DDR4-3000 CL16 | GPU: Nvidia GTX 1060 6GB Zotac Mini | Case: K280 Case | PSU: Cooler Master B600 Power supply | SSD: 1TB  | HDDs: 1x 250GB & 1x 1TB WD Blue | Monitors: 24" Acer S240HLBID + 24" Samsung  | OS: Win 10 Pro

 

Audio: Behringer Q802USB Xenyx 8 Input Mixer |  U-PHORIA UMC204HD | Behringer XM8500 Dynamic Cardioid Vocal Microphone | Sound Blaster Audigy Fx PCI-E card.

 

Home Lab:  Lenovo ThinkCenter M82 ESXi 6.7 | Lenovo M93 Tiny Exchange 2019 | TP-LINK TL-SG1024D 24-Port Gigabit | Cisco ASA 5506 firewall  | Cisco Catalyst 3750 Gigabit Switch | Cisco 2960C-LL | HP MicroServer G8 NAS | Custom built SCCM Server.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

7 hours ago, Sir Asvald said:

Of course it will cost a lot of money for new hardware and software. But those servers are probably costing them a lot of money just to keep them running.

 

Damn, what are the uses for the XP and Vista PCs? Special software?

I used to work at a place that produces (highly modern) electronical equipment (also for US government and Microsoft of all things) and they still used happily XP and Vista on the majority of "test units" , connected to the internet and all... only the chief executives had windows 10 basically. When I asked them why they just were like "too expensive"...  (this was like 2 or 3 years ago)

 

 

Tldr: I think this is far more common than you think.

The direction tells you... the direction

-Scott Manley, 2021

 

Softwares used:

Corsair Link (Anime Edition) 

MSI Afterburner 

OpenRGB

Lively Wallpaper 

OBS Studio

Shutter Encoder

Avidemux

FSResizer

Audacity 

VLC

WMP

GIMP

HWiNFO64

Paint

3D Paint

GitHub Desktop 

Superposition 

Prime95

Aida64

GPUZ

CPUZ

Generic Logviewer

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Windows sysadmin here - It's not a matter of "if", it's "when" this will be rolled up into ransomware suites. This is so bad, that Microsoft will be under PR pressure to release -for free- an update for 2008 R2 regardless of the fact it's EOL and you don't have extended support. The damage this could cause it incalculable at this point. If they didn't, I would imagine Microsoft executives being dragged before US Congress if this thing got out of hand.

Link to comment
Share on other sites

Link to post
Share on other sites

8 hours ago, Sir Asvald said:

Of course it will cost a lot of money for new hardware and software. But those servers are probably costing them a lot of money just to keep them running.

 

Damn, what are the uses for the XP and Vista PCs? Special software?

Mostly the reasons I gave above, but yeah, special software connected to stupendously expensive equipment. You going to throw away a 200 grand (or more) electron microscope because it doesn’t run on windows 10?

As #muricaparrotgang's founder, I invite you to join our ranks today.

"My name is Legion 'Murica Parrot Gang, for we are many."

 

(We actually welcome all forms of animated parrot gifs.)

 

The artist formerly known as Aelar_Nailo.

 

Profile Pic designed by the very lovely @Red :)!

Link to comment
Share on other sites

Link to post
Share on other sites

28 minutes ago, StDragon said:

Windows sysadmin here - It's not a matter of "if", it's "when" this will be rolled up into ransomware suites. This is so bad, that Microsoft will be under PR pressure to release -for free- an update for 2008 R2 regardless of the fact it's EOL and you don't have extended support. The damage this could cause it incalculable at this point. If they didn't, I would imagine Microsoft executives being dragged before US Congress if this thing got out of hand.

Honestly, the only real reason I could see Microsoft patching this would be due to them padding with zero's which was what allowed this attack to happen.

 

8 hours ago, Sir Asvald said:

Of course it will cost a lot of money for new hardware and software. But those servers are probably costing them a lot of money just to keep them running.

 

Damn, what are the uses for the XP and Vista PCs? Special software?

Virtualization.  While it's not ideal, you can get NT 4.0 running in a virtualized environment. Not that it's recommended, but it is what it is (software that would cost too much to replace given that it would need to be rewritten and re-tested...at least 50-60k which isn't practical and the fact that new software would need to be licensed which changed from a perpetual license to a per user yearly license...so that would have an added cost of 10k a year).

 

Sometimes it's just cheaper running the old stuff and making sure only limited things see/access it.

3735928559 - Beware of the dead beef

Link to comment
Share on other sites

Link to post
Share on other sites

On 9/14/2020 at 11:30 PM, rcmaehl said:

WHYWONTYOUHOTLINK.thumb.png.c4d179b2ebbaeab3acacfc48e20e149e.png

Oh s**t,

I am glad that usually my Server isn't connected to the internet...

 

Just replace everything with Zeroes...

They should not have gone public with it,it's too easy to execute and can cause extremely high damage.

A PC Enthusiast since 2011
AMD Ryzen 7 5700X@4.65GHz | GIGABYTE GTX 1660 GAMING OC @ Core 2085MHz Memory 5000MHz
Cinebench R23: 15669cb | Unigine Superposition 1080p Extreme: 3566
Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, Vishera said:

They should not have gone public with it,it's too easy to execute and can cause extremely high damage.

I think they totally should, its one more evidence of MS's incompetence. What kind of moron would let a client unlimited tries to auth?

Link to comment
Share on other sites

Link to post
Share on other sites

7 minutes ago, jagdtigger said:

I think they totally should, its one more evidence of MS's incompetence. What kind of moron would let a client unlimited tries to auth?

The worst bit here was they padded with zero's on an implementation that should have used random padding.  Had that hadn't happened it actually would be a lot harder to exploit it.  To that regard, cryptography is a difficult thing one innocent mistake during implementation can bring the entire thing down.  There are lots of examples of mistakes being made by large corporations.  *Spoofing comes to mind to causing a dos attack comes to mind in terms of limiting tries*  This mistake could literally boil down to one programmer padding without the understanding of the consequences.  Look at things like heartbleed, a simple mistake by a single person, it doesn't always speak of incompetence.  At least it wasn't

like Sony's mistake

int getRandom() {
	return 4;
}

 

29 minutes ago, Vishera said:

Just replace everything with Zeroes...

They should not have gone public with it,it's too easy to execute and can cause extremely high damage.

For those who are curious here is the link to the whitepaper

https://www.secura.com/pathtoimg.php?id=2055

 

It's been patched and I'm sure people would have figured out what changed eventually anyways.  It's not as trivial as sending full 0's anyways...just the main part of it is sending 0's through.

 

 

3735928559 - Beware of the dead beef

Link to comment
Share on other sites

Link to post
Share on other sites

17 minutes ago, wanderingfool2 said:

*Spoofing comes to mind to causing a dos attack comes to mind in terms of limiting tries*

Yeah but on the other hand if you have limited tries the system could notify the sysadmin, or trigger some scripts that would disconnect the offending system from  the network....... (Most corporations will use gear from the same manufacturer in their network so its pretty easy to do. Will it cause some disruption? Yes. But it is better than having your domain controller popped....)

Link to comment
Share on other sites

Link to post
Share on other sites

11 minutes ago, jagdtigger said:

Yeah but on the other hand if you have limited tries the system could notify the sysadmin, or trigger some scripts that would disconnect the offending system from  the network....... (Most corporations will use gear from the same manufacturer in their network so its pretty easy to do. Will it cause some disruption? Yes. But it is better than having your domain controller popped....)

Booting a system out for too many invalid attempts would just be asking for DOS....or you know locking out a domain controller

 

On a similar note, do we know that it didn't log it?  [Back in the day I remember having a lot of invalid password attempts and such].  I could be wrong, just thinking there probably was a way of seeing it in logs.

3735928559 - Beware of the dead beef

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, wanderingfool2 said:

Booting a system out for too many invalid attempts would just be asking for DOS....or you know locking out a domain controller

How would they do DOS if the compromised system is locked out from the network? 9_9

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×