Description |
FortiGuard Labs have observed the following vulnerabilities being exploited as outlined in the CISA advisory published about Russian military cyber actors
CVE-2020-1472, also known as “Zerologon”, is an elevation of privilege vulnerability which allows attackers to establish a vulnerable NetLogon Session with a Domain Controller to gain administrative privileges.
CVE-2021-3156 is a heap-based buffer overflow vulnerability in sudo (Linux) that allowed attackers to gain root privileges on a vulnerable host The following versions of Sudo are affected:
CVE-2021-26084 is an OGNL injection vulnerability in Confluence Server and Data Center which allows attackers to execute arbitrary code. The following version are affected:
CVE-2022-26134 is an OGNL injection vulnerability in Confluence Server and Data Center which allows attackers to execute arbitrary code. The following version are affected:
CVE-2022-2613 is a hard-coded credential vulnerability in Confluence Server and Data Center. The Atlassian Questions For Confluence app creates a hardcoded username and password user. This allowed attackers with knowledge of the hardcoded password to login into Confluence and access all content accessible to users in the confluence-users group. The following versions have the fix:
CVE-2022-3236 is a code injection vulnerability in User Portal and Webadmin in Sophos Firewall which allowed attackers perform remote code execution: The following version are affected:
CVE-2021-33044/CVE-2021-33045 is an authentication bypass vulnerability in Dahua products during the login process. Dahua is a company which specializes in video surveillance equipment. Refer to the following links for affected versions:
For more information on Russian Cyber Espionage Attack, refer to the following advisory published by CISA: https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a |
||||||||||||||||||||||||
CVE ID |
CVE-2020-1472 (https://nvd.nist.gov/vuln/detail/CVE-2020-1472) CVE-2021-3156 (https://nvd.nist.gov/vuln/detail/CVE-2021-3156) CVE-2021-26084 (https://nvd.nist.gov/vuln/detail/CVE-2021-26084) CVE-2022-26134 (https://nvd.nist.gov/vuln/detail/CVE-2022-26134) CVE-2022-26138 (https://nvd.nist.gov/vuln/detail/CVE-2022-26138) CVE-2022-3236 (https://nvd.nist.gov/vuln/detail/CVE-2022-3236) CVE-2021-33044 (https://nvd.nist.gov/vuln/detail/CVE-2021-33044) CVE-2021-33045 (https://nvd.nist.gov/vuln/detail/CVE-2021-33045) |
||||||||||||||||||||||||
NDR Cloud Detection Rule |
FortiNDR Cloud v2024.9+
|
||||||||||||||||||||||||
Playbook |
N/A | ||||||||||||||||||||||||
Threat Hunting |
FortiNDR Cloud users can use the following IOCs from Fortinet to hunt for “Russian Cyber Espionage Attack” related activities All IOCs listed above have been added to Threat Intelligence Intel |
||||||||||||||||||||||||
Suricata Coverage |
Customers can create custom investigation/detections using the Suricata signatures below: 2030871 -> ET EXPLOIT Possible Zerologon NetrServerAuthenticate with 0x00 Client Credentials (CVE-2020-1472) 2030888 -> ET INFO [401TRG] RPCNetlogon UUID (CVE-2020-1472) (Set) 2030870 -> ET EXPLOIT Possible Zerologon Phase 1/3 - NetrServerReqChallenge with 0x00 Client Challenge (CVE-2020-1472) 2035259 -> ET EXPLOIT Zerologon Phase 2/3 - NetrServerAuthenticate2 Request with 0x00 Client Challenge and Sign and Seal Disabled (CVE-2020-1472) M2 2035263 -> ET EXPLOIT Zerologon Phase 3/3 - NetrLogonSamLogonWithFlags Request with 0x00 Client Credentials (CVE-2020-1472) 2035258 -> ET EXPLOIT Zerologon Phase 2/3 - NetrServerAuthenticate2 Request with 0x00 Client Challenge and Sign and Seal Disabled (CVE-2020-1472) M1 2035260 -> ET EXPLOIT Zerologon Phase 2/3 - NetrServerAuthenticate3 Request with 0x00 Client Challenge and Sign and Seal Disabled (CVE-2020-1472) M1 2035261 -> ET EXPLOIT Zerologon Phase 2/3 - NetrServerAuthenticate3 Request with 0x00 Client Challenge and Sign and Seal Disabled (CVE-2020-1472) M2 2035262 -> ET EXPLOIT Zerologon Phase 3/3 - Malicious NetrServerPasswordSet2 (CVE-2020-1472) |
||||||||||||||||||||||||
Other Fortinet Products |
For more details regarding mitigating the vulnerability by utilizing Fortinet products, please refer to |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.