HC3 TLP White Sector Alert: “Zerologon” Netlogon Remote Protocol Vulnerability

September 18, 2020

In August, Microsoft released a patch for a vulnerability that is applicable to the healthcare community. CVE-2020-1472, also called Zerologon, was rated critical severity as it allows unauthenticated administrative access to a Windows domain controller (DC) and possible compromise of the entire domain. Applying the Microsoft patch will completely resolve this vulnerability, which HC3 recommends patching of vulnerable systems be prioritized for any healthcare organization.

Related Resources

Special Bulletin
Member
Federal agencies this morning are providing new information on an imminent ransomware threat to U.S. hospitals.
Special Bulletin
Member
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS)…
Issue Landing Page
The number of large-scale data breaches at American health care organization increased 65% from 2010 to 2016. As a result, federal agencies are increasing…
Guides/Reports
Trusted insiders, both witting and unwitting, can cause grave harm to your organizations facilities, resources, information, and personnel. Insider incidents…
Standards/Guidelines
Public
Agent Tesla is an established Remote Access Trojan (RAT) written in .Net. A successful deployment of Agent Tesla provides attackers with full computer or…
Webinar Recordings
Public
This guide provides participants with instructions and helpful tips for the Health Sector Cybersecurity Coordination Center (HC3) Cybersecurity Threat Briefing…