CVE-2020-1472 (CNNVD-202008-548)

MEDIUM 有利用代码
中文标题:
Microsoft Windows Netlogon 安全特征问题漏洞
英文标题:
Netlogon Elevation of Privilege Vulnerability
CVSS分数: 5.5
发布时间: 2020-08-17 19:13:05
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Microsoft Windows Netlogon是美国微软(Microsoft)公司的Windows的一个重要组件,主要功能是用户和机器在域内网络上的认证,以及复制数据库以进行域控备份,同时还用于维护域成员与域之间、域与域控之间、域DC与跨域DC之间的关系。 Microsoft Windows Netlogon 存在安全特征问题漏洞。攻击者可以使用 Netlogon 远程协议 (MS-NRPC) 建立与域控制器的易受攻击的 Netlogon 安全通道连接并进行特权提升。

英文描述:

NOT_EXTRACTED

CWE类型:
(暂无数据)
标签:
remote windows West Shepherd
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Microsoft Windows Server version 2004 - < publication - cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*
Microsoft Windows Server 2019 - < publication - cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
Microsoft Windows Server 2019 (Server Core installation) - < publication - cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
Microsoft Windows Server, version 1909 (Server Core installation) - < publication - cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*
Microsoft Windows Server, version 1903 (Server Core installation) - < publication - cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*
Microsoft Windows Server 2016 - < publication - cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
Microsoft Windows Server 2016 (Server Core installation) - < publication - cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
Microsoft Windows Server 2008 R2 Service Pack 1 - < publication - cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*
Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation) - < publication - cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*
Microsoft Windows Server 2012 - < publication - cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
Microsoft Windows Server 2012 (Server Core installation) - < publication - cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
Microsoft Windows Server 2012 R2 - < publication - cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*
Microsoft Windows Server 2012 R2 (Server Core installation) - < publication - cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*
Microsoft Windows Server version 20H2 - < publication - cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*
microsoft windows_server_1903 * - - cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*
microsoft windows_server_1909 * - - cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*
microsoft windows_server_2004 - - - cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:*:*
microsoft windows_server_2008 r2 - - cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
microsoft windows_server_2012 - - - cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
microsoft windows_server_2012 r2 - - cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
microsoft windows_server_2016 - - - cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
microsoft windows_server_2019 - - - cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
microsoft windows_server_20h2 - - - cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:*:*
fedoraproject fedora 31 - - cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
fedoraproject fedora 32 - - cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
fedoraproject fedora 33 - - cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
opensuse leap 15.1 - - cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
opensuse leap 15.2 - - cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
canonical ubuntu_linux 14.04 - - cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
canonical ubuntu_linux 16.04 - - cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
canonical ubuntu_linux 18.04 - - cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
canonical ubuntu_linux 20.04 - - cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
synology directory_server * - - cpe:2.3:a:synology:directory_server:*:*:*:*:*:*:*:*
samba samba * - - cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
debian debian_linux 9.0 - - cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
oracle zfs_storage_appliance_kit 8.8 - - cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_MISC
cve.org
访问
VU#490028 third-party-advisory
cve.org
访问
[oss-security] 20200917 Samba and CVE-2020-1472 ("Zerologon") mailing-list
cve.org
访问
USN-4510-1 vendor-advisory
cve.org
访问
USN-4510-2 vendor-advisory
cve.org
访问
FEDORA-2020-0be2776ed3 vendor-advisory
cve.org
访问
openSUSE-SU-2020:1513 vendor-advisory
cve.org
访问
openSUSE-SU-2020:1526 vendor-advisory
cve.org
访问
FEDORA-2020-77c15664b0 vendor-advisory
cve.org
访问
FEDORA-2020-a1d139381a vendor-advisory
cve.org
访问
USN-4559-1 vendor-advisory
cve.org
访问
[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update mailing-list
cve.org
访问
GLSA-202012-24 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
134c704f-9b21-4f2e-91b3-4a467353bcc0 OTHER
nvd.nist.gov
访问
ExploitDB EDB-49071 EXPLOIT
exploitdb
访问
Download Exploit EDB-49071 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2020-1472 ADVISORY
cve.org
访问
CVSS评分详情
3.1 (cna)
MEDIUM
5.5
CVSS向量: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
机密性
HIGH
完整性
NONE
可用性
NONE
时间信息
发布时间:
2020-08-17 19:13:05
修改时间:
2025-10-21 23:35:37
创建时间:
2025-11-11 15:36:04
更新时间:
2025-11-11 16:55:59
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2020-1472 2025-11-11 15:20:27 2025-11-11 07:36:04
NVD nvd_CVE-2020-1472 2025-11-11 14:57:02 2025-11-11 07:44:31
CNNVD cnnvd_CNNVD-202008-548 2025-11-11 15:12:30 2025-11-11 07:56:25
EXPLOITDB exploitdb_EDB-49071 2025-11-11 15:05:58 2025-11-11 08:55:59
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:55:59
references_count: 18 → 21; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 18 -> 21
  • tags_count: 0 -> 3
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:56:25
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-202008-548; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-202008-548
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:44:31
affected_products_count: 14 → 36; references_count: 17 → 18; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 14 -> 36
  • references_count: 17 -> 18
  • data_sources: ['cve'] -> ['cve', 'nvd']