article thumbnail

Microsoft rolled out emergency updates to fix Windows Server auth failures

Security Affairs

Microsoft has released out-of-band security updates to address authentication issues affecting Windows Server. Microsoft has released out-of-band updates to fix authentication failures related to Kerberos delegation scenarios impacting Domain Controllers (DC) running Windows Server. ” warns Microsoft.

article thumbnail

Microsoft recommends Exchange admins to disable the SMBv1 protocol

Security Affairs

It also provides an authenticated inter-process communication mechanism. Since 2016, Microsoft is urging admins to stop using SMBv1, later versions of the protocol implemented security enhancements, such as encryption, pre- authentication integrity checks to prevent man-in-the-middle (MiTM) attacks, and insecure guest authentication blocking.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DHS also issued an alert for the Windows BlueKeep flaw

Security Affairs

The agency urges Microsoft users and administrators to install security patches, disable unnecessary services, enable Network Level Authentication (NLA) if available, and block TCP port 3389. Enable Network Level Authentication. Enable Network Level Authentication in Windows 7, Windows Server 2008, and Windows Server 2008 R2.

article thumbnail

NSA urges Windows Users and admins to Patch BlueKeep flaw

Security Affairs

Microsoft has released patches for Windows 7, Server 2008, XP and Server 2003. Windows 7 and Server 2008 users can prevent unauthenticated attacks by enabling Network Level Authentication (NLA), and the threat can also be mitigated by blocking TCP port 3389. Enable Network Level Authentication.

article thumbnail

Expert developed a MetaSploit module for the BlueKeep flaw

Security Affairs

Microsoft has released patches for Windows 7, Server 2008, XP and Server 2003. Windows 7 and Server 2008 users can prevent unauthenticated attacks by enabling Network Level Authentication (NLA), and the threat can also be mitigated by blocking TCP port 3389. According to Z??osum0x0,

article thumbnail

Iran-linked APT is exploiting the Zerologon flaw in attacks

Security Affairs

The Netlogon service is an Authentication Mechanism used in the Windows Client Authentication Architecture which verifies logon requests, and it registers, authenticates, and locates Domain Controllers. The Zerologon vulnerability, tracked as CVE-2020-1472 , is an elevation of privilege that resides in the Netlogon.

article thumbnail

Microsoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks

Security Affairs

“This vulnerability is pre-authentication and requires no user interaction. “This vulnerability is pre-authentication and requires no user interaction. ” reads the security advisory published by Microsoft. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system.