CVE-2021-36942:Windows LSA Spoofing Vulnerability (CVE-2021-36942) allows attackers to spoof the Local Security Authority (LSA) to gain unauthorized access to network resources.

splash
Back

Description Preview

CVE-2021-36942 is a critical vulnerability in Windows Local Security Authority (LSA) that enables attackers to perform spoofing attacks. This vulnerability is related to the PetitPotam attack technique which allows unauthenticated attackers to coerce Windows domain controllers to authenticate against arbitrary servers using NTLM authentication. The vulnerability affects multiple Windows operating systems and could lead to domain compromise if successfully exploited.

Overview

This vulnerability affects the Windows Local Security Authority (LSA) component, which is responsible for authenticating users and enforcing security policies on Windows systems. The flaw allows attackers to spoof LSA and potentially force domain controllers to authenticate to an attacker-controlled server using NTLM authentication. This technique, known as NTLM relay attacks, can be leveraged to compromise Active Directory Certificate Services (AD CS) and potentially gain domain admin privileges. The vulnerability is particularly dangerous as it can be exploited remotely by unauthenticated attackers who can use it to compromise an entire Windows domain.

Remediation

  1. Apply the security update released by Microsoft in the August 2021 security updates.
  2. Implement NTLM protections such as Extended Protection for Authentication (EPA) and signing features like SMB signing.
  3. Configure domain controllers to use secure LDAP connections.
  4. Disable NTLM authentication where possible and enforce NTLMv2 responses only.
  5. For AD CS environments, configure Certificate Authority (CA) servers to require Kerberos for authentication.
  6. Implement network segmentation to limit potential attack vectors.
  7. Monitor for suspicious authentication attempts, particularly those involving NTLM.
  8. Consider disabling the unprotected NTLM authentication on domain controllers by configuring the "Network security: Restrict NTLM: NTLM authentication in this domain" Group Policy setting.

References

  1. Microsoft Security Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36942
  2. CERT Vulnerability Note VU#405600: https://www.kb.cert.org/vuls/id/405600
  3. Microsoft's guidance on mitigating NTLM relay attacks on AD CS: https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429
  4. PetitPotam technical analysis by various security researchers
  5. NTLM relay attack mitigation guidance from Microsoft

Early Warning

Armis Early Warning customers received an advanced alert on this vulnerability.

Armis Alert Date
Aug 18, 2021
CISA KEV Date
Nov 3, 2021
77days early
Learn More

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Health Care & Social Assistance
    Health Care & Social Assistance
  2. Manufacturing
    Manufacturing
  3. Public Administration
    Public Administration
  4. Educational Services
    Educational Services
  5. Finance and Insurance
    Finance and Insurance
  6. Transportation & Warehousing
    Transportation & Warehousing
  7. Retail Trade
    Retail Trade
  8. Professional, Scientific, & Technical Services
    Professional, Scientific, & Technical Services
  9. Utilities
    Utilities
  10. Information
    Information
  11. Arts, Entertainment & Recreation
    Arts, Entertainment & Recreation
  12. Other Services (except Public Administration)
    Other Services (except Public Administration)
  13. Management of Companies & Enterprises
    Management of Companies & Enterprises
  14. Accommodation & Food Services
    Accommodation & Food Services
  15. Construction
    Construction
  16. Real Estate Rental & Leasing
    Real Estate Rental & Leasing
  17. Agriculture, Forestry Fishing & Hunting
    Agriculture, Forestry Fishing & Hunting
  18. Mining
    Mining
  19. Wholesale Trade
    Wholesale Trade
  20. Administrative, Support, Waste Management & Remediation Services
    Administrative, Support, Waste Management & Remediation Services

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background
Armis Vulnerability Intelligence Database