An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
https://www.kb.cert.org/vuls/id/490028
http://www.openwall.com/lists/oss-security/2020/09/17/2
https://usn.ubuntu.com/4510-1/
https://www.synology.com/security/advisory/Synology_SA_20_21
https://usn.ubuntu.com/4510-2/
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html
https://usn.ubuntu.com/4559-1/
http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
Source: MITRE
Published: 2020-08-17
Updated: 2022-04-26
Type: CWE-330
Base Score: 9.3
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact Score: 10
Exploitability Score: 8.6
Severity: HIGH
Base Score: 10
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Impact Score: 6
Exploitability Score: 3.9
Severity: CRITICAL