Skip to primary content

Prime-WoW

My site, my way, no big company can change this

Prime-WoW

Main menu

  • Home
  • Discord
  • Forums
  • Games
    • 7DtD
      • 7DtD Map
      • 7DtD Official Forums
      • 7DtD Wiki
    • Minecraft
      • Survival Map
      • Vanilla Map
      • FTB Map
      • FTB Wiki
      • Download FTB Client
    • NWN
      • NWN Wiki
      • NWN Lexicon
      • NWN Vault
      • NWNX
      • NWN Info
      • Rhun Guide
    • Terraria
      • Terraria Map
    • WoW
      • Prime-WoW Site
      • WoW Armory
  • Unfiltered RSS
    • Bikes
    • Games
      • Kotaku
      • PS4 News
      • VR
    • Nature
      • TreeHugger
      • Survival
    • Technology
      • Hardware
        • Hot Hardware
      • Linux
        • Linux Today
        • LWN.net
        • LXer
        • Phoronix
        • RPi
      • LifeHacker
      • Akihabara News
      • AnandTech
      • Ars Technica
      • Engadget
      • Gear & Gadgets
      • Geekologie
      • Gizmodo
      • [H]ardOCP
      • io9
      • Slashdot
      • TG Daily

Post navigation

← Previous Next →

One of this year’s most severe Windows bugs is now under active exploit

Posted on September 24, 2020 by Xordac Prime
Image of ones and zeros with the word

(credit: Pixabay)

One of the highest-impact Windows vulnerabilities patched this year is now under active exploitation by malicious hackers, Microsoft warned overnight, in a development that puts increasing pressure on laggards to update now.

CVE-2020-1472, as the vulnerability is tracked, allows hackers to instantly take control of the Active Directory, a Windows server resource that acts as an all-powerful gatekeeper for all machines connected to a network. Researchers have dubbed the vulnerability Zerologon, because it allows attackers with only minimal access to a vulnerable network to login to the Active Directory by sending a string of zeros in messages that use the Netlogon protocol.

Zerologon carries a critical severity rating from Microsoft as well as a maximum of 10 under the Common Vulnerability Scoring System. Despite the high rating, the escalation-of-privileges vulnerability received scant, if any, attention when Microsoft patched it in August, and Microsoft deemed the chances of actual exploitation “less likely.”

Read 9 remaining paragraphs | Comments



Source: Ars Technica – One of this year’s most severe Windows bugs is now under active exploit

This entry was posted in Ars Technica, Unfiltered RSS and tagged Ars Technica by Xordac Prime. Bookmark the permalink.
Proudly powered by WordPress