Description Preview
CVE-2021-36942 is a critical vulnerability in Windows Local Security Authority (LSA) that enables attackers to perform spoofing attacks. This vulnerability is related to the PetitPotam attack technique which allows unauthenticated attackers to coerce Windows domain controllers to authenticate against arbitrary servers using NTLM authentication. The vulnerability affects multiple Windows operating systems and could lead to domain compromise if successfully exploited.
Overview
This vulnerability affects the Windows Local Security Authority (LSA) component, which is responsible for authenticating users and enforcing security policies on Windows systems. The flaw allows attackers to spoof LSA and potentially force domain controllers to authenticate to an attacker-controlled server using NTLM authentication. This technique, known as NTLM relay attacks, can be leveraged to compromise Active Directory Certificate Services (AD CS) and potentially gain domain admin privileges. The vulnerability is particularly dangerous as it can be exploited remotely by unauthenticated attackers who can use it to compromise an entire Windows domain.
Remediation
- Apply the security update released by Microsoft in the August 2021 security updates.
- Implement NTLM protections such as Extended Protection for Authentication (EPA) and signing features like SMB signing.
- Configure domain controllers to use secure LDAP connections.
- Disable NTLM authentication where possible and enforce NTLMv2 responses only.
- For AD CS environments, configure Certificate Authority (CA) servers to require Kerberos for authentication.
- Implement network segmentation to limit potential attack vectors.
- Monitor for suspicious authentication attempts, particularly those involving NTLM.
- Consider disabling the unprotected NTLM authentication on domain controllers by configuring the "Network security: Restrict NTLM: NTLM authentication in this domain" Group Policy setting.
References
- Microsoft Security Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36942
- CERT Vulnerability Note VU#405600: https://www.kb.cert.org/vuls/id/405600
- Microsoft's guidance on mitigating NTLM relay attacks on AD CS: https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429
- PetitPotam technical analysis by various security researchers
- NTLM relay attack mitigation guidance from Microsoft
Early Warning
Armis Early Warning customers received an advanced alert on this vulnerability.
- Armis Alert Date
- Aug 18, 2021
- CISA KEV Date
- Nov 3, 2021
77days early
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Health Care & Social AssistanceHealth Care & Social Assistance
- ManufacturingManufacturing
- Public AdministrationPublic Administration
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Transportation & WarehousingTransportation & Warehousing
- Retail TradeRetail Trade
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- UtilitiesUtilities
- InformationInformation
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- Other Services (except Public Administration)Other Services (except Public Administration)
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- Accommodation & Food ServicesAccommodation & Food Services
- ConstructionConstruction
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- MiningMining
- Wholesale TradeWholesale Trade
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services