Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2021-36949

Опубликовано: 10 авг. 2021
Источник: msrc
CVSS3: 7.1
EPSS Низкий

Описание

Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability

FAQ

What should I do to be protected against this vulnerability?

In addition to applying the updates in this CVE, you will need to disable NTLM as per the guidance as follows:

For Azure Active Directory Connect, see Prerequisites for Azure AD Connect For Azure Active Directory Connect Provisioning Agent, see Prerequisites for Azure AD Connect cloud sync

What must an attacker do to exploit this vulnerability

The attacker must be able to establish Man-in-the-middle between your Azure AD Connect server and a domain controller. The attacker also needs to possess domain user credentials to be able to exploit this vulnerability.

Обновления

ПродуктСтатьяОбновление
Microsoft Azure Active Directory Connect 2.0.X.Y
Microsoft Azure Active Directory Connect 1.X.Y.Z
Azure Active Directory Connect Provisioning Agent

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 73%
0.0079
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
nvd
больше 4 лет назад

Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability

CVSS3: 7.1
github
больше 3 лет назад

Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability

CVSS3: 7.1
fstec
больше 4 лет назад

Уязвимость программных средств облачной платформы Azure Active Directory Connect Provisioning Agent и Azure Active Directory Connect, связанная с недостатками механизма аутентификации, позволяющая нарушителю обойти механизмы безопасности

EPSS

Процентиль: 73%
0.0079
Низкий

7.1 High

CVSS3