{"id":11555,"date":"2020-10-02T00:28:15","date_gmt":"2020-10-02T00:28:15","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=11555"},"modified":"2026-04-17T18:07:47","modified_gmt":"2026-04-17T18:07:47","slug":"netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/","title":{"rendered":"Netlogon Privilege Escalation Vulnerability (CVE-2020-1472) Handling Guide"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">1.&nbsp; Vulnerability Description<\/h2>\n\n\n\n<p>Recently, NSFOCUS detected that the foreign security company Secura disclosed detailed information and validation scripts about the Netlogon privilege escalation vulnerability (CVE-2020-1472), which increases vulnerability risks abruptly. Exploitation of this vulnerability requires a computer on the same local area network (LAN) as the target. When using the Netlogon Remote Protocol (MS-NRPC) to establish a secure channel connection to a domain controller, an unauthenticated attacker could exploit the vulnerability to obtain domain administrator access. The vulnerability was disclosed by Microsoft in its August 2020 security updates. With a CVSS base score of 10, it has an extensive impact. At present, EXP has been made public on the Internet. Affected users are advised to take preventive measures as soon as possible.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Netlogon is a service used to register all SRV resource records for domain controllers in Windows. It authenticates users and machines on intra-domain networks and replicates databases for domain control backup. It is also used to maintain the relationships between domain members and domains, between domains and domain control, and between domain DC and cross-domain DC.<\/p>\n\n\n\n<p>NSFOCUS reproduced the vulnerability shortly after it was reported:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"554\" height=\"180\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/1002-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11557\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/1002-1.jpg 554w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/1002-1-300x97.jpg 300w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/figure><\/div>\n\n\n\n<p>Reference link:<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1472\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">2. Scope of Impact<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Affected versions<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Windows Server 2008 R2 for x64-based Systems Service Pack 1<\/li><li>Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)<\/li><li>Windows Server 2012<\/li><li>Windows Server 2012 (Server Core installation)<\/li><li>Windows Server 2012 R2<\/li><li>Windows Server 2012 R2 (Server Core installation)<\/li><li>Windows Server 2016<\/li><li>Windows Server 2016 (Server Core installation)<\/li><li>Windows Server 2019<\/li><li>Windows Server 2019 (Server Core installation)<\/li><li>Windows Server, version 1903 (Server Core installation)<\/li><li>Windows Server, version 1909 (Server Core installation)<\/li><li>Windows Server, version 2004 (Server Core installation)<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">3. Check for the Vulnerability<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Tool-based Verification<\/li><\/ul>\n\n\n\n<p>Secura has uploaded verification scripts at GitHub. Relevant users can use the tool for check:<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/github.com\/SecuraBV\/CVE-2020-1472\n<\/div><\/figure>\n\n\n\n<p>The result of checking the affected system (Windows Server 2012 R2) is as follows:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"600\" height=\"84\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/1002-2-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11559\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/1002-2-1.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/09\/1002-2-1-300x42.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>Detection with NSFOCUS Products<\/li><\/ul>\n\n\n\n<p>NSFOCUS Remote Security Assessment System (RSAS), Network Intrusion Detection System (NIDS), and Unified Threat Sensor (UTS) are capable of scanning and detecting the vulnerability. Please upgrade them to the latest versions.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Product<\/strong><\/td><td><strong>Version<\/strong><\/td><td><a><strong>Download Link<\/strong><\/a><strong><\/strong><\/td><\/tr><tr><td><strong>RSAS V6 system plug-in package<\/strong><\/td><td>V6.0R02F01.1917<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/108456<\/td><\/tr><tr><td><strong>IDS<\/strong><strong><\/strong><\/td><td>5.6.9.23542<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/108464<\/td><\/tr><tr><td>5.6.10.23542<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/108465<\/td><\/tr><tr><td><strong>UTS<\/strong><strong><\/strong><\/td><td>5.6.10.23542<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/108469<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>For how to upgrade NSFOCUS RSAS, click the following link:<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/mp.weixin.qq.com\/s\/aLAWXs5DgRhNHf4WHHhQyg\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">4. Mitigation<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Official Fix<\/strong><\/li><\/ul>\n\n\n\n<p>Currently, Microsoft has released security updates to fix the preceding vulnerability in product versions supported by Microsoft. Affected users should apply these updates as soon as possible. These updates are available at the following link:<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1472\n<\/div><\/figure>\n\n\n\n<p>Note: Windows Update may fail due to network and computer environment problems. Therefore, users are advised to check whether the patches are successfully updated immediately after installation.<\/p>\n\n\n\n<p>Please right-click the Windows icon, select <strong>Settings (N)<\/strong>, choose <strong>System and Security &gt; Windows Update<\/strong>, and view the prompt message on the page. Alternatively, please view historical updates by clicking the <strong>View update history<\/strong> button.<\/p>\n\n\n\n<p>If some updates cannot be successfully installed, please click the update names to jump to Microsoft&#8217;s download page. Users are advised to click the links on the page to visit the &#8220;Microsoft Update Catalog&#8221; website to download and install independent packages.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Other Protection Measures<\/li><\/ul>\n\n\n\n<p>After installing and updating the patches, you can also deploy the domain controller (DC) enforcing mode to be free from the vulnerability:<\/p>\n\n\n\n<p>Please refer to the official document &#8220;How to Manage the Changes in Netlogon Secure Channel Connections Concerning CVE-2020-1472&#8221; for configuration:<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/support.microsoft.com\/zh-cn\/help\/4557222\/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc\n<\/div><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>Protection with NSFOCUS Products<\/li><\/ul>\n\n\n\n<p>NSFOCUS Network Intrusion Protection System (NIPS) has released related rules to defend against this vulnerability. Users are advised to update the rule base to the latest version to ensure that the security product can effectively protect against this vulnerability. The following table lists the rule base version of security products.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Product<\/strong><\/td><td><strong>Rule Base Version<\/strong><\/td><td><a><strong>Download Link<\/strong><\/a><strong><\/strong><\/td><\/tr><tr><td><strong>IPS<\/strong><strong><\/strong><\/td><td>5.6.9.23542<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/108464<\/td><\/tr><tr><td>5.6.10.23542<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/108465<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>For how to update product rules, click the following link:<\/p>\n\n\n\n<p>IPS: <a href=\"https:\/\/mp.weixin.qq.com\/s\/JsRktENQNj1TdZSU62N0Ww\">https:\/\/mp.weixin.qq.com\/s\/JsRktENQNj1TdZSU62N0Ww<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Monitoring with NSFOCUS Platform<\/li><\/ul>\n\n\n\n<p>NSFOCUS Enterprise Security Platform (ESP-H) is capable of monitoring the vulnerability. Relevant users can monitor vulnerabilities via the platform.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Security Platform<\/strong><\/td><td><strong>Upgrade Package\/Rule Base Version<\/strong><\/td><\/tr><tr><td><strong>NSFOCUS Enterprise Security Platform (ESP-H)<\/strong><\/td><td>Use the latest rule base upgrade package ESP-EVENTRULE-013-20200915<strong><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n\n\n\n<p>A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>1.&nbsp; Vulnerability Description Recently, NSFOCUS detected that the foreign security company Secura disclosed detailed information and validation scripts about the Netlogon privilege escalation vulnerability (CVE-2020-1472), which increases vulnerability risks abruptly. Exploitation of this vulnerability requires a computer on the same local area network (LAN) as the target. When using the Netlogon Remote Protocol (MS-NRPC) to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10318,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[355,543],"class_list":["post-11555","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-cyber-security","tag-netlogon"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Netlogon Privilege Escalation Vulnerability (CVE-2020-1472) Handling Guide - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Netlogon Privilege Escalation Vulnerability (CVE-2020-1472) Handling Guide - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"1.&nbsp; Vulnerability Description Recently, NSFOCUS detected that the foreign security company Secura disclosed detailed information and validation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-02T00:28:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Netlogon Privilege Escalation Vulnerability (CVE-2020-1472) Handling Guide - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"1.&nbsp; Vulnerability Description Recently, NSFOCUS detected that the foreign security company Secura disclosed detailed information and validation\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Netlogon Privilege Escalation Vulnerability (CVE-2020-1472) Handling Guide\",\"datePublished\":\"2020-10-02T00:28:15+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\\\/\"},\"wordCount\":987,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/0424-2.jpg\",\"keywords\":[\"cyber security\",\"Netlogon\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\\\/\",\"name\":\"Netlogon Privilege Escalation Vulnerability (CVE-2020-1472) Handling Guide - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/0424-2.jpg\",\"datePublished\":\"2020-10-02T00:28:15+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/0424-2.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/0424-2.jpg\",\"width\":625,\"height\":322,\"caption\":\"Futuristic digital landscape with glowing blue lines.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Netlogon Privilege Escalation Vulnerability (CVE-2020-1472) Handling Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Netlogon Privilege Escalation Vulnerability (CVE-2020-1472) Handling Guide - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Netlogon Privilege Escalation Vulnerability (CVE-2020-1472) Handling Guide - NSFOCUS","og_description":"1.&nbsp; Vulnerability Description Recently, NSFOCUS detected that the foreign security company Secura disclosed detailed information and validation","og_url":"https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/","og_site_name":"NSFOCUS","article_published_time":"2020-10-02T00:28:15+00:00","article_modified_time":"2026-04-17T18:07:47+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Netlogon Privilege Escalation Vulnerability (CVE-2020-1472) Handling Guide - NSFOCUS","twitter_description":"1.&nbsp; Vulnerability Description Recently, NSFOCUS detected that the foreign security company Secura disclosed detailed information and validation","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Netlogon Privilege Escalation Vulnerability (CVE-2020-1472) Handling Guide","datePublished":"2020-10-02T00:28:15+00:00","dateModified":"2026-04-17T18:07:47+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/"},"wordCount":987,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg","keywords":["cyber security","Netlogon"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/","url":"https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/","name":"Netlogon Privilege Escalation Vulnerability (CVE-2020-1472) Handling Guide - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg","datePublished":"2020-10-02T00:28:15+00:00","dateModified":"2026-04-17T18:07:47+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg","width":625,"height":322,"caption":"Futuristic digital landscape with glowing blue lines."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/netlogon-privilege-escalation-vulnerability-cve-2020-1472-handling-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Netlogon Privilege Escalation Vulnerability (CVE-2020-1472) Handling Guide"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=11555"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11555\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/10318"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=11555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=11555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=11555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}