‘Zerologon’ Windows domain admin bypass exploit released

News security flaw vulnerability

Exploit code for a severe privilege escalation bug in the Netlogon Remote Protocol for Domain Controllers on Windows networks has now been published, and users are advised to apply the August security patch released by Microsoft as soon as possible. Today, a proof of concept was published on Github by security researcher Dirk-jan Mollenma for the vulnerability, which has the full 10.0 out of 10 possible Common Vulnerability Scoring System (CVSS) severity rating.

https://www.itnews.com.au/news/zerologon-windows-domain-admin-bypass-exploit-released-553317