Forum Discussion
hps88
Dec 07, 2023Copper Contributor
Multiple MDI alerts for "Suspected Netlogon privilege elevation attempt (CVE-2020-1472 exploitation"
We're seeing several alerts firing up in our environment for the above. The alerts are primarily coming up from Linux hosts which are using the Winbindd component in Samba to integrate with the AD. W...
LeonPavesic
Dec 07, 2023Silver Contributor
Hi hps88,
The alerts you're seeing relate to the CVE-2020-1472 Netlogon Elevation of Privilege Vulnerability, commonly known as ZeroLogon. This vulnerability allows an attacker to escalate privileges to a domain administrator level by exploiting a flaw in the Netlogon Remote Protocol.
Microsoft Defender for Identity can detect attempts to exploit this vulnerability.
The alerts may be triggered during testing of detection methods in a lab environment, which occasionally leads to false positives.
In complex network setups, especially where Linux hosts integrate with Active Directory these alerts may be triggered by normal activity.
The limited information on the alert page is designed to provide key details about the attempted exploitation, such as the device involved, the domain controller, the targeted asset, and the success of the impersonation attempts.
If you're confident there's no malicious activity, consider reaching out to Microsoft Support for assistance. They can help investigate the issue and adjust the alert system's sensitivity.
It is also recommended to restrict access to port 135 at the firewall level to internal devices and install at least the August 2020 patches from Microsoft to mitigate the risk of exploitation.
ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Community Hub
www.cyber.gc.ca
Please click Mark as Best Response & Like if my post helped you to solve your issue.
This will help others to find the correct solution easily. It also closes the item.
If the post was useful in other ways, please consider giving it Like.
Kindest regards,
Leon Pavesic
(LinkedIn)