Organizations should prioritize patching over detection when it comes to Zerologon, a recently disclosed privilege escalation vulnerability in Microsoft’s Windows server operating system.
The bug, which received a 10 out of 10 for severity by the Common Vulnerability Scoring System, exploits a flaw in the customized cryptographic protocol used by Netlogon to authenticate communications between a client and Windows domain server and update passwords.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.