Status of Zerologon (CVE-2020-1472) security issue in UCS

Zerologon is a vulnerability which exploits an issue in netlogon cryptography. It allows attackers to gain Domain Administrator rights. The only requirement for the attacker is to have unauthenticated network access to the domain controller.

More information about the vulnerability is available at Secura

Information about CVE-2020-1472 in Samba can be found in the upstream bugtracker: Bug 14497 CVE-2020-1472 Samba impact of “ZeroLogin”

A default installation of UCS with Samba as Active Directory Domain Controller is not affected by the vulnerability. UCS does not alter the Samba default setting for the server schannel = yes configuration option.

However, Administrators should check that they have not changed these default manually, e.g. in order to support older clients in their network.
When executing

testparm -s 2>1 | grep -i "server schannel"

on all Samba DCs in the domain, there should be no output - the default value of server schannel = yes is not printed. If server schannel = no or server schannel = auto is printed, the domain is vulnerable. The option should be removed from the Samba configuration and the Samba services should be restarted with /etc/init.d/samba restart