Hi, All.
We have some MWG servers with v.7.8.1/7.8.2 appliances running.
On this proxies we use the NTLM authorization method for authorizing users on our DC.
DC controller runs on MS Windows Server 2016, and after installing last patches (KB4571694, KB4565349 for MS Windows Server 2019).
for CVE-2020-1472 in the logs of the DC we find the next events
How it's critical for future using Netlogon? Will it cause problems with user authorization after February 9, 2021?
Solved! Go to Solution.
Now addressed in 9.2.6 and 8.2.15 which are released and available for download.
This issue have been addressed in the below 4 webgateway versions:
7.8.2.26, 8.2.15, 9.2.6 and 10.0.2
For detailed information on how to upgrade please refer to the release notes, chapter “Installation”
https://contentsecurity.mcafee.com/fd?file=mwg/mwg7/release-notes/mwg_release_8.2.15_RN-RELEASE.pdf
https://contentsecurity.mcafee.com/fd?file=mwg/mwg7/release-notes/mwg_release_9.2.6_RN-RELEASE.pdf
Regards,
Shibani
Hi,
Hope you are doing well.
>we will make necessary changes to our code accordingly and this will be addressed.
This mean, that we are forced to upgrade our appliances to higher versions?
Hi,
Hope you are doing well.
Currently our engineering team is looking into this, will keep you posted once I hear back something on this.
Regards
Alok Sarda
We have just been asked to investigate the same issue - CVE-2020-1472 has been installed on some DC's with the subsequent connection will be denied once enforcement phase is released - currently have have 8.2.9 installed
Just a couple additional notes. It is just a warning at present. Per the article MS will not start enforcing until Q1 2021. Customers may want to consider taking this opportunity to move to authentication via Kerberos, which is unaffected, more secure and more efficient method of transparent authentication.
Please inform us about results of investigation
Hi McAfee,
what is the latest status about it ? Did you solved the problem with a the newest version ?
Br,
Sven
Hi,
same "problem" here.
Our AD-administrator contacted me yesterday and told me that he sees many warning-entries from our MGWs in the evenlog of the DCs ("The Netlogon service allowed a vulnerable Netlogon secure channel connection.").
Would be nice if you keep us up-to-date.
Kind regards
Of course same problem her!
Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA