<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Zerologon: Samba Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/zerologon-samba-netlogon-elevation-of-privilege-vulnerability/m-p/4158172#M51243</link>
    <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anybody knows if Cisco address the vulnerability below? Are the CUCM and CUC affected by this vulnerability since they are using Linux OS? Although it is an appliance type where administrators cannot change anything on the OS level but seems to be affected by the vulnerability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked the Cisco Security Advisory but couldn't find any regarding this topic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/unified-communications/unified-communications-manager-callmanager/products-security-advisories-list.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/unified-communications/unified-communications-manager-callmanager/products-security-advisories-list.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security Vulnerability:&lt;/P&gt;&lt;H1&gt;Zerologon: Samba Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472)&lt;/H1&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://access.redhat.com/articles/5435971" target="_blank" rel="noopener"&gt;https://access.redhat.com/articles/5435971&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://linuxsecurity.com/advisories/suse/suse-2020-2722-1-important-samba-11-16-56?rss" target="_blank" rel="noopener"&gt;https://linuxsecurity.com/advisories/suse/suse-2020-2722-1-important-samba-11-16-56?rss&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 15:18:39 GMT</pubDate>
    <dc:creator>jays_jara</dc:creator>
    <dc:date>2020-09-28T15:18:39Z</dc:date>
    <item>
      <title>Zerologon: Samba Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472)</title>
      <link>https://community.cisco.com/t5/application-networking/zerologon-samba-netlogon-elevation-of-privilege-vulnerability/m-p/4158172#M51243</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anybody knows if Cisco address the vulnerability below? Are the CUCM and CUC affected by this vulnerability since they are using Linux OS? Although it is an appliance type where administrators cannot change anything on the OS level but seems to be affected by the vulnerability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked the Cisco Security Advisory but couldn't find any regarding this topic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/unified-communications/unified-communications-manager-callmanager/products-security-advisories-list.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/unified-communications/unified-communications-manager-callmanager/products-security-advisories-list.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security Vulnerability:&lt;/P&gt;&lt;H1&gt;Zerologon: Samba Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472)&lt;/H1&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://access.redhat.com/articles/5435971" target="_blank" rel="noopener"&gt;https://access.redhat.com/articles/5435971&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://linuxsecurity.com/advisories/suse/suse-2020-2722-1-important-samba-11-16-56?rss" target="_blank" rel="noopener"&gt;https://linuxsecurity.com/advisories/suse/suse-2020-2722-1-important-samba-11-16-56?rss&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 15:18:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/zerologon-samba-netlogon-elevation-of-privilege-vulnerability/m-p/4158172#M51243</guid>
      <dc:creator>jays_jara</dc:creator>
      <dc:date>2020-09-28T15:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: Zerologon: Samba Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472)</title>
      <link>https://community.cisco.com/t5/application-networking/zerologon-samba-netlogon-elevation-of-privilege-vulnerability/m-p/4165812#M51244</link>
      <description>&lt;P&gt;For quicker responses involving CUCM and CUC you might want to post over in those support areas at&amp;nbsp;&lt;A href="https://community.cisco.com/t5/collaboration-voice-and-video/ct-p/4691-collaboration-voice-video" target="_blank"&gt;https://community.cisco.com/t5/collaboration-voice-and-video/ct-p/4691-collaboration-voice-video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would suspect CUCM and related appliances are not vulnerable as they do not provide samba related services.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kirk...&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 10:48:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/zerologon-samba-netlogon-elevation-of-privilege-vulnerability/m-p/4165812#M51244</guid>
      <dc:creator>Kirk J</dc:creator>
      <dc:date>2020-10-13T10:48:03Z</dc:date>
    </item>
  </channel>
</rss>

