Remote Capture of Domain Administrator Net-NTLMv1/v2 Authentication Challenge Hash Vulnerability

Remote Capture of Domain Administrator Net-NTLMv1/v2 Authentication Challenge Hash Vulnerability

CVE-2020-15931 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Netwrix Account Lockout Examiner before 5.1 allows remote attackers to capture the Net-NTLMv1/v2 authentication challenge hash of the Domain Administrator (that is configured within the product in its installation state) by generating a single Kerberos Pre-Authentication Failed (ID 4771) event on a Domain Controller.

Learn more about our Web Application Penetration Testing UK.