Overview
CVE-2020-1472, nicknamed "ZeroLogon," is a cryptographic vulnerability in the Windows Netlogon Remote Protocol (MS-NRPC) that allows an unauthenticated attacker on a network to take over a Windows Active Directory domain controller in seconds — with no credentials. The flaw arises from the use of AES-CFB8 encryption with an all-zero initialization vector (IV): due to a statistical property of this configuration, sending approximately 256 authentication attempts composed entirely of zero bytes will, on average, succeed in authenticating as any domain computer account — including the domain controller itself.
Once authenticated as the domain controller's computer account, an attacker can set its password to empty, then use standard domain replication (DCSync) to dump all domain credentials — achieving complete domain takeover without needing any existing account.
Note on CVSS score: The NVD CVSS score of 5.5 (Local, PR:L) reflects a narrow technical interpretation. Microsoft's own advisory rated this Critical (CVSS 10.0) — a network-accessible attack requiring no credentials that results in full domain compromise. The security industry widely treats ZeroLogon as a Critical/10.0 vulnerability.
What Is the Windows Netlogon Protocol?
The Netlogon Remote Protocol (MS-NRPC) is a core Windows authentication mechanism used by domain member computers to authenticate to domain controllers, synchronize passwords, and discover domain controller locations. Domain controllers run the Netlogon service and expose it over SMB/RPC (TCP 445 and dynamic RPC ports). Any machine with network access to a domain controller — including domain-joined workstations and servers — can initiate Netlogon sessions.
Affected Versions
| Windows Version | Vulnerable | Fixed |
|---|---|---|
| Windows Server 2008 R2 SP1 | Yes | August 2020 Patch Tuesday |
| Windows Server 2012 | Yes | August 2020 Patch Tuesday |
| Windows Server 2012 R2 | Yes | August 2020 Patch Tuesday |
| Windows Server 2016 | Yes | August 2020 Patch Tuesday |
| Windows Server 2019 | Yes | August 2020 Patch Tuesday |
| Windows Server 2004 | Yes | August 2020 Patch Tuesday |
| Domain controller role required | — | Attack targets DCs specifically |
The attack targets domain controllers running any affected Windows Server version. Domain member workstations and servers are not directly targeted but enable lateral movement.
Technical Details
Root Cause: AES-CFB8 with Zero Initialization Vector
The Netlogon authentication process (NetrServerAuthenticate3) uses a challenge-response protocol. The server sends a random 8-byte challenge, and the client encrypts a credential using a session key derived from the computer account password. The encryption is AES-CFB8 (Cipher Feedback mode with 8-bit segment size).
The cryptographic flaw: MS-NRPC specifies that the AES-CFB8 IV is always all zeros. Due to a well-known property of AES-CFB8 with a zero IV, there is approximately a 1/256 probability that encrypting an all-zero plaintext produces an all-zero ciphertext. This means:
- The expected credential value (the correct response) is some unknown ciphertext.
- But if the session key happens to produce an all-zero response for all-zero input, the authentication succeeds with a zero credential.
- The attacker simply sends 256 authentication attempts, each with an all-zero credential, and on average one will succeed.
Exploitation: Step by Step
- Establish a Netlogon secure channel to the target domain controller, spoofing as any domain computer account (or the domain controller's own computer account).
- Send authentication attempts with all-zero client credentials and all-zero client challenge. After an average of 256 attempts (seconds of work), one succeeds — the server accepts the session.
- Call
NetrServerPasswordSet2to set the domain controller's computer account password to empty (all zeros). - Authenticate to the domain controller using the now-empty computer account password via standard authentication (Impacket's secretsdump, Mimikatz, etc.).
- Perform DCSync — use the domain replication protocol to dump all Active Directory credentials including the
krbtgtaccount hash, enabling Golden Ticket creation and full domain persistence.
Attack Characteristics
| Attribute | Detail |
|---|---|
| Network Requirement | Access to domain controller on port 445 / RPC dynamic ports |
| Authentication Required | None — attack authenticates without any credentials |
| Speed | Full domain compromise achievable in seconds |
| Impact | Complete Active Directory domain takeover |
| Accounts at Risk | All domain accounts including Domain Admin and krbtgt |
| Persistence Method | DCSync → Golden Ticket (does not require ongoing domain access) |
Discovery
Tom Tervoort of Secura BV (Netherlands) discovered the vulnerability. Secura disclosed it to Microsoft in April 2020 under coordinated disclosure. Microsoft patched it in the August 2020 Patch Tuesday (August 11, 2020). Secura published their technical whitepaper on September 11, 2020 — one month after the patch — which immediately triggered public PoC development. Within days, multiple functional PoC exploits were published and CISA issued Emergency Directive 20-04 requiring federal agencies to patch within 3 days.
Exploitation Context
ZeroLogon saw immediate, widespread exploitation following Secura's whitepaper publication:
- Nation-state use: Iranian APT groups (Pioneer Kitten / Fox Kitten, UNC757) used ZeroLogon for initial Active Directory compromise within weeks of PoC release
- Ransomware operators: Multiple ransomware groups incorporated ZeroLogon into their lateral movement playbooks for rapid domain takeover
- CISA ED 20-04: The speed of exploitation prompted one of CISA's fastest-ever emergency directive issuances (72-hour remediation requirement)
- Incomplete mitigation window: Microsoft's patch required a phased rollout — an initial compatibility mode (August 2020 patch) and an enforcement mode (February 2022). Organizations that applied only the initial patch remained partially exposed until enforcement mode was enabled
Remediation
Recommended Actions
-
Apply the August 2020 Patch Tuesday update to all domain controllers immediately. Verify all DCs are patched:
wmic qfe list | findstr 4571694(or KB number for your Windows Server version). -
Enable enforcement mode. The initial patch introduced a compatibility mode; enforcement mode (blocking vulnerable Netlogon connections) was made default in the February 2022 cumulative update. Verify enforcement is active:
Event ID 5827 in the System log indicates a vulnerable Netlogon connection was blocked. -
Monitor for ZeroLogon exploitation attempts: Look for Event ID 4742 (computer account password changed) on domain controllers, especially for the domain controller's own computer account. Also monitor for Event IDs 4627/4625 with zero-byte credentials.
-
Rotate the
krbtgtaccount password twice if you suspect compromise — Golden Tickets remain valid until thekrbtgtpassword is rotated (twice to invalidate all tickets based on both old hashes). -
Audit domain admin group membership and review for unauthorized accounts created during any potential compromise window.
-
Restrict Netlogon access at the network perimeter — domain controllers should not be directly accessible from untrusted network segments. Micro-segmentation of AD infrastructure reduces exposure.
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2020-1472 |
| Vendor / Product | Microsoft — Netlogon |
| NVD Published | 2020-08-17 |
| NVD Last Modified | 2026-02-23 |
| CVSS 3.1 Score | 5.5 |
| CVSS 3.1 Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
| Severity | MEDIUM |
| CISA KEV Added | 2021-11-03 |
| CISA KEV Deadline | 2022-05-03 |
| Known Ransomware Use | ⚠️ Yes |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2020-08-11 | Microsoft patches CVE-2020-1472 in August 2020 Patch Tuesday |
| 2020-08-17 | CVE-2020-1472 published |
| 2020-09-11 | Secura publishes ZeroLogon technical whitepaper; public PoC exploits appear immediately |
| 2020-09-17 | CISA issues Emergency Directive 20-04 requiring federal agencies to patch within 3 days |
| 2020-09-18 | PoC exploit released by dirkjanm; active exploitation confirmed |
| 2021-11-03 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2022-02-09 | Microsoft's 'Phase 2' enforcement mode enabled by default for all domain controllers |
| 2022-05-03 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2020-1472 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |
| Microsoft Security Response Center — CVE-2020-1472 | Vendor Advisory |
| Secura: ZeroLogon — Technical Whitepaper by Tom Tervoort | Security Research |
| CVE-2020-1472 PoC — dirkjanm (impacket-based) | Security Research |
| BleepingComputer: ZeroLogon Attack PoC Exploits Available | Security Research |