INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 31m Global insider Cybersecurity Services CRITICAL 41m Global ransomware Multiple sectors (U.S. companies) CRITICAL 54m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 31m Global insider Cybersecurity Services CRITICAL 41m Global ransomware Multiple sectors (U.S. companies) CRITICAL 54m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 31m Global insider Cybersecurity Services CRITICAL 41m Global ransomware Multiple sectors (U.S. companies) CRITICAL 54m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2020-1472

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft Netlogon Privilege Escalation Vulnerability — Microsoft's Netlogon Remote Protocol (MS-NRPC) contains a privilege escalation vulnerability when an attacker establishes a vulnerable Netlogon
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft Netlogon Privilege Escalation Vulnerability — Microsoft's Netlogon Remote Protocol (MS-NRPC) contains a privilege escalation vulnerability when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller. An attacker who successfully exploits the vulnerability could run a specially crafted application on a device on the network. The vulnerability is also known under the moniker of Zerologon.

🤖 AI Executive Summary

CVE-2020-1472, known as 'Zerologon,' is a critical privilege escalation vulnerability in Microsoft's Netlogon Remote Protocol (MS-NRPC) with a CVSS score of 9.0. An unauthenticated attacker on the same network can exploit a cryptographic flaw in the Netlogon authentication process to impersonate any domain-joined computer, including domain controllers, and ultimately gain full domain administrator privileges. Active exploits are publicly available and have been weaponized in ransomware campaigns and nation-state attacks. Immediate patching and enforcement of secure Netlogon channel are mandatory given the severity and exploit maturity.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 18, 2026 23:50
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses an extreme risk to Saudi organizations across all sectors that rely on Microsoft Active Directory environments. Government entities under NCA oversight and CITC-regulated organizations face the highest exposure, as domain controller compromise leads to complete enterprise takeover. Saudi banking institutions regulated by SAMA are at critical risk since domain compromise can bypass multi-factor authentication and enable lateral movement to SWIFT and core banking systems. Saudi Aramco, NEOM, and energy sector OT/IT converged environments are particularly vulnerable as Zerologon can bridge IT and OT network segments. Telecom providers such as STC and Mobily face risks of service disruption and subscriber data exfiltration. Healthcare organizations under MOH are at risk of ransomware deployment following domain compromise. Given that public exploits are freely available and Saudi infrastructure heavily relies on Windows Active Directory, this vulnerability should be treated as an active incident response scenario.
🏢 Affected Saudi Sectors
Government Banking Energy Telecom Healthcare Defense Education Transportation Critical Infrastructure
⚖️ Saudi Risk Score (AI)
9.8
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS (Within 24 hours):
1. Apply Microsoft security update KB4557222 (August 2020 Patch Tuesday) or later cumulative updates for all affected Windows Server versions (2008 R2, 2012, 2012 R2, 2016, 2019).
2. Enable enforcement mode for Netlogon secure channel by setting the registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters — set 'FullSecureChannelProtection' to 1.
3. Isolate domain controllers from untrusted network segments immediately.
4. Audit Netlogon event logs for Event ID 5827, 5828, 5829, and 5830 to detect exploitation attempts.

PATCHING GUIDANCE:
5. Microsoft released a two-phase patch: Phase 1 (August 2020) enables protection with monitoring; Phase 2 (February 2021) enforces full secure channel — ensure both phases are applied.
6. Prioritize patching all domain controllers before member servers.
7. Verify patch status using: wmic qfe list | findstr KB4557222

COMPENSATING CONTROLS (if patching is delayed):
8. Restrict Netlogon traffic (TCP/UDP port 135, 49152-65535) to only authorized domain-joined devices via firewall ACLs.
9. Implement network segmentation to isolate domain controllers.
10. Enable Windows Defender Credential Guard on domain controllers.
11. Deploy honeypot domain controllers to detect exploitation attempts.

DETECTION RULES:
12. Monitor for Event IDs 5827/5828 (denied vulnerable Netlogon connections) in Windows Security logs.
13. Deploy Sigma rule: detect Netlogon authentication with null session or zero-filled client challenge.
14. Use Zerologon-specific detection scripts (e.g., from Secura PoC scanner) to test your own environment.
15. Alert on any new domain admin account creation or password reset of KRBTGT account.
16. Implement SIEM correlation rules for multiple failed Netlogon authentications followed by successful domain admin logon.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية (خلال 24 ساعة):
1. تطبيق تحديث الأمان KB4557222 من مايكروسوفت (تحديث أغسطس 2020) أو التحديثات التراكمية الأحدث لجميع إصدارات Windows Server المتأثرة (2008 R2، 2012، 2012 R2، 2016، 2019).
2. تفعيل وضع التطبيق الإلزامي لقناة Netlogon الآمنة عبر ضبط مفتاح السجل: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters — تعيين 'FullSecureChannelProtection' إلى 1.
3. عزل وحدات التحكم بالنطاق عن شرائح الشبكة غير الموثوقة فورًا.
4. مراجعة سجلات أحداث Netlogon للبحث عن معرفات الأحداث 5827 و5828 و5829 و5830 للكشف عن محاولات الاستغلال.

إرشادات التصحيح:
5. أصدرت مايكروسوفت تصحيحًا على مرحلتين: المرحلة الأولى (أغسطس 2020) تُفعّل الحماية مع المراقبة؛ المرحلة الثانية (فبراير 2021) تُطبّق القناة الآمنة بشكل كامل — تأكد من تطبيق كلتا المرحلتين.
6. إعطاء الأولوية لتصحيح جميع وحدات التحكم بالنطاق قبل الخوادم الأعضاء.
7. التحقق من حالة التصحيح باستخدام: wmic qfe list | findstr KB4557222

ضوابط التعويض (في حال تأخر التصحيح):
8. تقييد حركة مرور Netlogon (المنافذ TCP/UDP 135 و49152-65535) على الأجهزة المصرح لها فقط عبر قوائم التحكم بالوصول في جدار الحماية.
9. تطبيق تجزئة الشبكة لعزل وحدات التحكم بالنطاق.
10. تفعيل Windows Defender Credential Guard على وحدات التحكم بالنطاق.
11. نشر وحدات تحكم نطاق وهمية للكشف عن محاولات الاستغلال.

قواعد الكشف:
12. مراقبة معرفات الأحداث 5827/5828 (اتصالات Netlogon المرفوضة) في سجلات أمان Windows.
13. نشر قاعدة Sigma للكشف عن مصادقة Netlogon بجلسة فارغة أو تحدي عميل مملوء بالأصفار.
14. استخدام سكريبتات الكشف الخاصة بـ Zerologon لاختبار بيئتك الخاصة.
15. التنبيه على أي إنشاء لحساب مسؤول نطاق جديد أو إعادة تعيين كلمة مرور حساب KRBTGT.
16. تطبيق قواعد ارتباط SIEM لرصد محاولات مصادقة Netlogon الفاشلة المتعددة يعقبها تسجيل دخول ناجح لمسؤول النطاق.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Cybersecurity Vulnerability Management — critical patch within defined SLA ECC-2-2-1: Identity and Access Management — privileged account protection ECC-2-3-1: Network Security — domain controller network segmentation ECC-2-5-1: Cybersecurity Event Logs and Monitoring — Netlogon event monitoring ECC-2-6-1: Cybersecurity Incident Management — active exploitation response ECC-3-3-2: Secure Configuration Management — Netlogon enforcement mode
🔵 SAMA CSF
3.3.3 Vulnerability Management — critical vulnerability remediation within 72 hours 3.3.5 Patch Management — emergency patching procedures for domain controllers 3.4.1 Identity and Access Management — domain admin privilege protection 3.4.2 Privileged Access Management — domain controller access controls 3.3.6 Security Monitoring and Analytics — Netlogon anomaly detection 3.3.7 Cyber Incident Management — Zerologon exploitation response plan
🟡 ISO 27001:2022
A.8.8 Management of technical vulnerabilities — immediate patching of critical CVE A.8.2 Privileged access rights — domain administrator privilege controls A.8.20 Networks security — domain controller network segmentation A.8.15 Logging — Netlogon authentication event monitoring A.8.16 Monitoring activities — anomalous Netlogon activity detection A.5.26 Response to information security incidents — Zerologon incident response
🟣 PCI DSS v4.0
Requirement 6.3.3 — All system components protected from known vulnerabilities via security patches Requirement 7.2 — Access to system components and cardholder data restricted to least privilege Requirement 8.2 — User identification and authentication for domain accounts Requirement 10.2 — Audit logs for privileged access and authentication events Requirement 11.3 — External and internal vulnerability scanning and penetration testing
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:Netlogon
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.38%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-05-03
Published 2021-11-03
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.8
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.