{"id":7608,"date":"2020-09-23T11:28:15","date_gmt":"2020-09-23T08:28:15","guid":{"rendered":"https:\/\/www.inforte.com\/?p=7608"},"modified":"2020-09-30T13:53:38","modified_gmt":"2020-09-30T10:53:38","slug":"cve-2020-1472-zerologon-zafiyeti","status":"publish","type":"post","link":"https:\/\/www.inforte.com\/en\/cve-2020-1472-zerologon-zafiyeti\/","title":{"rendered":"CVE-2020-1472 \u201cZerologon\u201d Zafiyeti"},"content":{"rendered":"<p>CVSS \u201810.0\u2019 tam puan olarak Windows Server ve Active Directory bile\u015fenlerini ciddi \u015fekilde etkileyen bir a\u00e7\u0131k yay\u0131nland\u0131, zafiyet ile sald\u0131rganlar domain etki aln\u0131ndaki herhangi bir istemciye eri\u015fim varsa, <span id=\"96811be3-0fa7-4088-8c99-1dc97e63122a\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"96811be3-0fa7-4088-8c99-1dc97e63122a\">etki <\/span>alan\u0131 i\u00e7erisindeki sistemlere eri\u015fim sa\u011flamas\u0131na olanak sa\u011fl\u0131yor.<\/p>\n<br \/>\n<p><img decoding=\"async\" class=\"size-medium wp-image-7606 aligncenter\" src=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726-300x150.png\" alt=\"\" width=\"300\" height=\"150\" srcset=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726-300x150.png 300w, https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726-768x384.png 768w, https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726.png 1000w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p data-renderer-start-pos=\"284\">\u00a0<br \/><\/p>\n<p data-renderer-start-pos=\"284\">\u0130lgili g\u00fcvenlik a\u00e7\u0131\u011f\u0131 Microsoft&#8217;un A\u011fustos g\u00fcncellemesinde d\u00fczeltildi, ancak detaylar\u0131 tam olarak a\u00e7\u0131klanmam\u0131\u015ft\u0131. Bu sald\u0131r\u0131 tekni\u011fi ile tehdit akt\u00f6rleri \u00e7e\u015fitli k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m veya Uzak Masa\u00fcst\u00fc Protokol\u00fcne (RDP) ile sistemlere illegal eri\u015fim sa\u011flayarak ba\u015fta <a class=\"sc-feJyhm duptaq\" title=\"https:\/\/attack.mitre.org\/tactics\/TA0004\/\" href=\"https:\/\/attack.mitre.org\/tactics\/TA0004\/\" data-renderer-mark=\"true\">Privilaged Escelation<\/a> ve <a class=\"sc-feJyhm duptaq\" title=\"https:\/\/attack.mitre.org\/tactics\/TA0008\/\" href=\"https:\/\/attack.mitre.org\/tactics\/TA0008\/\" data-renderer-mark=\"true\">Lateral Movement<\/a> taktiklerini kullanarak <span id=\"b6355d66-0851-4fe2-9da8-9d3d4fac7dd5\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"b6355d66-0851-4fe2-9da8-9d3d4fac7dd5\">bir\u00e7ok<\/span> atak tekni\u011finin<span class=\"valid\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"79e63f29-622f-4ede-bcdf-2141b1e3f3f2\"> kolayca \u00e7<\/span>al\u0131\u015fmas\u0131na olanak sa\u011flamaktad\u0131r. Zafiyetin yeni olmas\u0131, ve i\u015fletim sistemi yamalama periyodunun ortalama 90 g\u00fcn oldu\u011fu d\u00fc\u015f\u00fcn\u00fcld\u00fc\u011f\u00fcnde <span id=\"77a3432a-85b9-45bf-b01c-ca6f7aa7ff74\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"77a3432a-85b9-45bf-b01c-ca6f7aa7ff74\">bir\u00e7ok<\/span> kurumun potansiyel olarak risk alt\u0131nda oldu\u011funu varsayabiliriz.<\/p>\n<p data-renderer-start-pos=\"284\">\u00a0<br \/><\/p>\n<p data-renderer-start-pos=\"854\">CVE-2020-1472 zafiyetinden yararlanmak i\u00e7in, sald\u0131rgan\u0131n, domain eri\u015fimi elde etmek i\u00e7in MS-NRPC(Netlogon Remote Protocol) kullanmas\u0131 gerekmektedir. \u0130lgili zafiyet \u015fifreleri g\u00fcncellemek ve eri\u015fim sa\u011flamak i\u00e7in MS-NRPC taraf\u0131ndan kullan\u0131lan kriptografik kimlik do\u011frulama \u015femas\u0131ndaki bir kusurdan kaynaklanmaktad\u0131r. Sald\u0131rgan, domain admin kullan\u0131c\u0131lar\u0131n\u0131n kendisi de dahil olmak \u00fczere herhangi bir bilgisayar\u0131n yetkilerini almak ve kendisini bu kimlik bilgileri ile maskeleyerek gizlenmesine de olanak sa\u011flayabilir yada orjinal DC paralos\u0131n\u0131n de\u011fi\u015fmesini sa\u011flayabilir. Di\u011fer bir olas\u0131l\u0131k ise \u201czerologon\u201d sald\u0131r\u0131s\u0131 ile tehdit akt\u00f6rleri hedef a\u011fda k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ve fidye yaz\u0131l\u0131mlar\u0131n\u0131 daha kolay \u015fekilde kullanmalar\u0131na da olanak sa\u011flayarak \u00e7e\u015fitli fidye ataklar\u0131 ile kendini g\u00f6sterebilir.<\/p>\n<p data-renderer-start-pos=\"854\">\u00a0<br \/><\/p>\n<div class=\"rich-media-item mediaSingleView-content-wrap image-center sc-jqCOkK kqsYcb sc-dNLxif jUwogs\" data-layout=\"center\" data-width=\"65\" data-node-type=\"mediaSingle\">\n<div class=\"sc-jbKcbu gVVXtM\">\n<div class=\"sc-iomxrj drleBR\" data-context-id=\"4096001\" data-type=\"file\" data-node-type=\"media\" data-width=\"768\" data-height=\"666\" data-id=\"8d6ee2cf-007f-4905-9469-26b4afe99c1c\" data-collection=\"contentId-4096001\" data-file-name=\"image-20200922-190119.png\" data-file-size=\"114567\" data-file-mime-type=\"image\/png\">\n<div class=\"sc-hwcHae dVZJvX\" data-testid=\"media-card-view\">\n<div class=\"media-file-card-view sc-drlKqa kLunDR sc-hRmvpr huQUKC\" data-testid=\"media-file-card-view\" data-test-status=\"complete\" data-test-media-name=\"image-20200922-190119.png\" data-test-progress=\"1\">\n<div class=\"wrapper\">\n<div class=\"img-wrapper\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium wp-image-7607 aligncenter\" src=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/478dfd49-7596-4cec-89a7-9172e86d01ad-300x260.png\" alt=\"\" width=\"300\" height=\"260\" srcset=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/478dfd49-7596-4cec-89a7-9172e86d01ad-300x260.png 300w, https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/478dfd49-7596-4cec-89a7-9172e86d01ad.png 768w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n<div>\u00a0<br \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p data-renderer-start-pos=\"1654\">Sald\u0131r\u0131 tekni\u011fi istemcilerin DC&#8217;ye ba\u011flanmak i\u00e7in kullan\u0131lan \u2018ComputeNetlogonCredential\u2019 ile kullan\u0131lan AES-CFB8 \u015fifrelemesinin yanl\u0131\u015f i\u015flenmesi nedeniyle, payla\u015f\u0131lan \u015fifreleme anahtar\u0131n\u0131n s\u0131f\u0131ra e\u015fit olmas\u0131ndan kaynaklanmaktad\u0131r, bu nedenle ad\u0131na \u2018ZeroLogon\u2019 ad\u0131 verilmi\u015ftir. Sald\u0131r\u0131 domain parolas\u0131n\u0131 de\u011fi\u015ftirmek ve bir etki alan\u0131n\u0131n denetimini tamamen ele ge\u00e7irmesi 3 saniyeden az s\u00fcrede ger\u00e7ekle\u015fmektedir. Atak MITRE ATT&amp;CK alt\u0131nda <a class=\"sc-feJyhm duptaq\" title=\"https:\/\/attack.mitre.org\/tactics\/TA0008\/\" href=\"https:\/\/attack.mitre.org\/tactics\/TA0008\/\" data-renderer-mark=\"true\">Lateral Movmenet Tactic<\/a> ve <a class=\"sc-feJyhm duptaq\" title=\"https:\/\/attack.mitre.org\/techniques\/T1210\/\" href=\"https:\/\/attack.mitre.org\/techniques\/T1210\/\" data-renderer-mark=\"true\">Exploitation of Remote Services (T1210)<\/a> olarak listelenmi\u015ftir.<\/p>\n<p data-renderer-start-pos=\"1654\">\u00a0<br \/><\/p>\n<h2 data-renderer-start-pos=\"2181\">Etkilenen Sistemler<\/h2>\n<div>\u00a0<br \/><\/div>\n<p data-renderer-start-pos=\"2202\">Windows Server 2019 ve Windows Server 2016&#8217;n\u0131n herhangi bir s\u00fcr\u00fcm\u00fcn\u00fcn yan\u0131 s\u0131ra Windows Server s\u00fcr\u00fcm 1909, Windows Server s\u00fcr\u00fcm 1903, Windows Server s\u00fcr\u00fcm 1809 (Datacenter ve Standart s\u00fcr\u00fcmler), Server 2012 R2, Windows Server 2012 ve Windows Server 2008 R2 Service Pack 1. domain etki alan\u0131n\u0131 ele ge\u00e7irebilir.<\/p>\n<p data-renderer-start-pos=\"2202\">\u00a0<br \/><\/p>\n<h2 data-renderer-start-pos=\"2515\">CVE-2020-1472 i\u00e7in G\u00fcvenlik Ad\u0131mlar\u0131<\/h2>\n<br \/>\n<ul>\n<li data-renderer-start-pos=\"2555\">A\u011fustos 2020 yamas\u0131 ile Netlogon zafiyet i\u00e7eren ba\u011flant\u0131lar\u0131 yeni \u201cEventID 5829\u201d ile belirtilerek ilgili CVE-2020-1472 i\u00e7eren netlogon istekleri \u00f6zel olarak belirtilebilmektedir. SIEM\/SOAR teknolojileri ile Entegre \u00e7al\u0131\u015fabilen NAC\/NGFW \u00e7\u00f6z\u00fcmleri ile ilgili bloklama ve izolasyon i\u015flemleri ger\u00e7ekle\u015ftirilebilinir.<\/li>\n<li data-renderer-start-pos=\"2555\">Tan\u0131ml\u0131 a\u011flar d\u0131\u015f\u0131ndan gelen MS-NRPC trafi\u011fi MFA\/2FA\/OTP gibi y\u00f6ntemlerle trafi\u011fin sald\u0131rgan taraf\u0131ndan kolayca istismar edilmesi zorla\u015ft\u0131r\u0131labilinir.<\/li>\n<li data-renderer-start-pos=\"2555\">NDR <span id=\"ae9b6557-7331-42fa-9e4e-017a474fca20\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"ae9b6557-7331-42fa-9e4e-017a474fca20\">ya da <\/span>vb y\u00f6ntemlerle vulnerable MS-NRPC raw trafi\u011fi izlenebilir, gerekli durumlarda savunma katman\u0131ndaki \u00e7\u00f6z\u00fcmlerle entegre edilerek <span id=\"2348d515-799b-41dc-8b87-6068d23e2196\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"2348d515-799b-41dc-8b87-6068d23e2196\">yanal<\/span> yay\u0131lma etkinli\u011fi azalt\u0131labilir.<\/li>\n<li data-renderer-start-pos=\"2555\">A\u011fustos 2020 Yamas\u0131 ile g\u00fcncellemelerin yap\u0131lmas\u0131<\/li>\n<li data-renderer-start-pos=\"2555\">MS-NRPC i\u00e7in \u2018enforcement mode\u2019 Secure NRPC t\u00fcm cihazlar i\u00e7in devreye almak. Microsoft <span id=\"7161f965-03fb-4300-96ed-e25979ae7258\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"7161f965-03fb-4300-96ed-e25979ae7258\">\u015eubat <\/span>2021 yamas\u0131 ile bunu t\u00fcm istemciler i\u00e7in zorunlu hale getirece\u011fini a\u00e7\u0131klad\u0131.<\/li>\n<li data-renderer-start-pos=\"2555\">Test Python Scripti ile zafiyetin \u00e7al\u0131\u015fabilece\u011fi sistemleri test edebilirsiniz. \u0130lgili linke <a class=\"sc-feJyhm duptaq\" title=\"https:\/\/github.com\/SecuraBV\/CVE-2020-1472\" href=\"https:\/\/github.com\/SecuraBV\/CVE-2020-1472\" data-renderer-mark=\"true\">buradan <\/a><a href=\"https:\/\/www.inforte.com\/en\/cookie-policy\/\" target=\"_blank\" rel=\"noopener\">Cookie Policy<\/a>.<\/li>\n<\/ul>\n<p>Detayl\u0131 \u00e7\u00f6z\u00fcm ve bilgi i\u00e7in <a class=\"sc-iELTvK jHUAie\" title=\"mailto:info@inforte.com.tr\" href=\"mailto:info@inforte.com.tr\" data-renderer-mark=\"true\">sales@inforte.com.tr<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>CVSS \u201810.0\u2019 tam puan olarak Windows Server ve Active Directory bile\u015fenlerini ciddi \u015fekilde etkileyen bir a\u00e7\u0131k yay\u0131nland\u0131, zafiyet ile sald\u0131rganlar domain etki aln\u0131ndaki herhangi bir istemciye eri\u015fim varsa, etki alan\u0131 i\u00e7erisindeki sistemlere eri\u015fim sa\u011flamas\u0131na olanak sa\u011fl\u0131yor. \u00a0 \u0130lgili g\u00fcvenlik a\u00e7\u0131\u011f\u0131 Microsoft&#8217;un A\u011fustos g\u00fcncellemesinde d\u00fczeltildi, ancak&#8230;<\/p>","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[257],"tags":[261,263,262],"class_list":["post-7608","post","type-post","status-publish","format-standard","hentry","category-blog","tag-cve-2020-1472","tag-lateralmovement","tag-ms-nrpc"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVE-2020-1472 \u201cZerologon\u201d Zafiyeti - Inforte Bili\u015fim A.\u015e.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inforte.com\/en\/cve-2020-1472-zerologon-zafiyeti\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2020-1472 \u201cZerologon\u201d Zafiyeti - Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"og:description\" content=\"CVSS \u201810.0\u2019 tam puan olarak Windows Server ve Active Directory bile\u015fenlerini ciddi \u015fekilde etkileyen bir a\u00e7\u0131k yay\u0131nland\u0131, zafiyet ile sald\u0131rganlar domain etki aln\u0131ndaki herhangi bir istemciye eri\u015fim varsa, etki alan\u0131 i\u00e7erisindeki sistemlere eri\u015fim sa\u011flamas\u0131na olanak sa\u011fl\u0131yor. \u00a0 \u0130lgili g\u00fcvenlik a\u00e7\u0131\u011f\u0131 Microsoft&#8217;un A\u011fustos g\u00fcncellemesinde d\u00fczeltildi, ancak...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inforte.com\/en\/cve-2020-1472-zerologon-zafiyeti\/\" \/>\n<meta property=\"og:site_name\" content=\"Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-23T08:28:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-30T10:53:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726-300x150.png\" \/>\n<meta name=\"author\" content=\"Inforte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inforte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/\"},\"author\":{\"name\":\"Inforte\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\"},\"headline\":\"CVE-2020-1472 \u201cZerologon\u201d Zafiyeti\",\"datePublished\":\"2020-09-23T08:28:15+00:00\",\"dateModified\":\"2020-09-30T10:53:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/\"},\"wordCount\":624,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726-300x150.png\",\"keywords\":[\"CVE-2020-1472\",\"LateralMovement\",\"MS-NRPC\"],\"articleSection\":[\"Inforte Blog\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/\",\"url\":\"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/\",\"name\":\"CVE-2020-1472 \u201cZerologon\u201d Zafiyeti - Inforte Bili\u015fim A.\u015e.\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726-300x150.png\",\"datePublished\":\"2020-09-23T08:28:15+00:00\",\"dateModified\":\"2020-09-30T10:53:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#primaryimage\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726-300x150.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726-300x150.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ana sayfa\",\"item\":\"https:\/\/www.inforte.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2020-1472 \u201cZerologon\u201d Zafiyeti\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inforte.com\/#website\",\"url\":\"https:\/\/www.inforte.com\/\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"description\":\"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording\",\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inforte.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inforte.com\/#organization\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"url\":\"https:\/\/www.inforte.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"width\":286,\"height\":180,\"caption\":\"Inforte Bili\u015fim A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\",\"name\":\"Inforte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"caption\":\"Inforte\"},\"url\":\"https:\/\/www.inforte.com\/en\/author\/content\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2020-1472 \u201cZerologon\u201d Zafiyeti - Inforte Bili\u015fim A.\u015e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inforte.com\/en\/cve-2020-1472-zerologon-zafiyeti\/","og_locale":"en_GB","og_type":"article","og_title":"CVE-2020-1472 \u201cZerologon\u201d Zafiyeti - Inforte Bili\u015fim A.\u015e.","og_description":"CVSS \u201810.0\u2019 tam puan olarak Windows Server ve Active Directory bile\u015fenlerini ciddi \u015fekilde etkileyen bir a\u00e7\u0131k yay\u0131nland\u0131, zafiyet ile sald\u0131rganlar domain etki aln\u0131ndaki herhangi bir istemciye eri\u015fim varsa, etki alan\u0131 i\u00e7erisindeki sistemlere eri\u015fim sa\u011flamas\u0131na olanak sa\u011fl\u0131yor. \u00a0 \u0130lgili g\u00fcvenlik a\u00e7\u0131\u011f\u0131 Microsoft&#8217;un A\u011fustos g\u00fcncellemesinde d\u00fczeltildi, ancak...","og_url":"https:\/\/www.inforte.com\/en\/cve-2020-1472-zerologon-zafiyeti\/","og_site_name":"Inforte Bili\u015fim A.\u015e.","article_published_time":"2020-09-23T08:28:15+00:00","article_modified_time":"2020-09-30T10:53:38+00:00","og_image":[{"url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726-300x150.png","type":"","width":"","height":""}],"author":"Inforte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Inforte","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#article","isPartOf":{"@id":"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/"},"author":{"name":"Inforte","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6"},"headline":"CVE-2020-1472 \u201cZerologon\u201d Zafiyeti","datePublished":"2020-09-23T08:28:15+00:00","dateModified":"2020-09-30T10:53:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/"},"wordCount":624,"commentCount":0,"publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"image":{"@id":"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726-300x150.png","keywords":["CVE-2020-1472","LateralMovement","MS-NRPC"],"articleSection":["Inforte Blog"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/","url":"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/","name":"CVE-2020-1472 \u201cZerologon\u201d Zafiyeti - Inforte Bili\u015fim A.\u015e.","isPartOf":{"@id":"https:\/\/www.inforte.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#primaryimage"},"image":{"@id":"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726-300x150.png","datePublished":"2020-09-23T08:28:15+00:00","dateModified":"2020-09-30T10:53:38+00:00","breadcrumb":{"@id":"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#primaryimage","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726-300x150.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/1cf68756-376a-4963-a511-3eb07e632726-300x150.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inforte.com\/cve-2020-1472-zerologon-zafiyeti\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ana sayfa","item":"https:\/\/www.inforte.com\/"},{"@type":"ListItem","position":2,"name":"CVE-2020-1472 \u201cZerologon\u201d Zafiyeti"}]},{"@type":"WebSite","@id":"https:\/\/www.inforte.com\/#website","url":"https:\/\/www.inforte.com\/","name":"Inforte Bili\u015fim A.\u015e.","description":"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording","publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inforte.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.inforte.com\/#organization","name":"Inforte Bili\u015fim A.\u015e.","url":"https:\/\/www.inforte.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","width":286,"height":180,"caption":"Inforte Bili\u015fim A.\u015e."},"image":{"@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6","name":"Inforte","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","caption":"Inforte"},"url":"https:\/\/www.inforte.com\/en\/author\/content\/"}]}},"_links":{"self":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/7608"}],"collection":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/comments?post=7608"}],"version-history":[{"count":6,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/7608\/revisions"}],"predecessor-version":[{"id":7617,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/7608\/revisions\/7617"}],"wp:attachment":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media?parent=7608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/categories?post=7608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/tags?post=7608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}