Discussion in 'other security issues & news' started by ronjor, Sep 14, 2020.
Original release date: September 14, 2020
CERT/CC Releases Information on Critical Vulnerability in Microsoft Windows Netlogon Remote Protocol
September 17, 2020
A Proof of Concept Exploit for the “Windows Zerologon” Flaw is Out
CISA Releases Emergency Directive on Microsoft Windows Netlogon Remote Protocol
September 18, 2020
Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472)
September 22, 2020
Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472
Microsoft clarifies patch confusion for Windows Zerologon flaw
September 29, 2020
Ransomware gang now using critical Windows flaw in attacks
October 9, 2020
Election Systems Under Attack via Microsoft Zerologon Exploits
Microsoft Warns of Continued Exploitation of CVE-2020-1472
October 29, 2020
Microsoft Defender for Identity now detects Zerologon attacks
November 30, 2020
Microsoft Implements Windows Zerologon Flaw ‘Enforcement Mode’
Starting Feb. 9, Microsoft will enable Domain Controller “enforcement mode” by default to address CVE-2020-1472.
January 15, 2021
Separate names with a comma.