[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-99489-7

Platform: cpe:/o:microsoft:windows_server_2016Date: (C)2023-09-08   (M)2023-10-13



This security setting determines whether the domain controller bypasses secure RPC for Netlogon secure channel connections for specified machine accounts. When deployed, this policy should be applied to all domain controllers in a forest by enabling the policy on the domain controllers OU. When the Create Vulnerable Connections list (allow list) is configured: - Given allow permission, the domain controller will allow accounts to use a Netlogon secure channel without secure RPC. - Given deny permission, the domain controller will require accounts to use a Netlogon secure channel with secure RPC which is the same as the default (not necessary). Fix: (1) GPO: Computer ConfigurationPoliciesWindows SettingsSecurity SettingsLocal PoliciesSecurity OptionsDomain controller: Allow vulnerable Netlogon secure channel connections (2) REG: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesNetlogonParameters:VulnerableChannelAllowList


Parameter:

[Security Descriptor]


Technical Mechanism:

(1) GPO: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Domain controller: Allow vulnerable Netlogon secure channel connections (2) REG: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters!VulnerableChannelAllowList

CCSS Severity:CCSS Metrics:
CCSS Score : 10.0Attack Vector: NETWORK
Exploit Score: 3.9Attack Complexity: LOW
Impact Score: 6.0Privileges Required: NONE
Severity: CRITICALUser Interaction: NONE
Vector: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HScope: CHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:92700


OVAL    1
oval:org.secpod.oval:def:92700
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_Server_2016

© SecPod Technologies