Rapid7 Vulnerability & Exploit Database

Netlogon Weak Cryptographic Authentication

Back to Search

Netlogon Weak Cryptographic Authentication

Created
09/23/2020

Description

A vulnerability exists within the Netlogon authentication process where the security properties granted by AES are lost due to an implementation flaw related to the use of a static initialization vector (IV). An attacker can leverage this flaw to target an Active Directory Domain Controller and make repeated authentication attempts using NULL data fields which will succeed every 1 in 256 tries (~0.4%). This module leverages the vulnerability to reset the machine account password to an empty string, which will then allow the attacker to authenticate as the machine account. After exploitation, it's important to restore this password to it's original value. Failure to do so can result in service instability.

Author(s)

  • Tom Tervoort
  • Spencer McIntyre
  • Dirk-jan Mollema

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/admin/dcerpc/cve_2020_1472_zerologon
msf auxiliary(cve_2020_1472_zerologon) > show actions
    ...actions...
msf auxiliary(cve_2020_1472_zerologon) > set ACTION < action-name >
msf auxiliary(cve_2020_1472_zerologon) > show options
    ...show and set options...
msf auxiliary(cve_2020_1472_zerologon) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;