Zerologon is a vulnerability which exploits an issue in netlogon cryptography. It allows attackers to gain Domain Administrator rights. The only requirement for the attacker is to have unauthenticated network access to the domain controller.
Information about CVE-2020-1472 in Samba can be found in the upstream bugtracker: Bug 14497 CVE-2020-1472 Samba impact of “ZeroLogin”
A default installation of UCS with Samba as Active Directory Domain Controller is not affected by the vulnerability. UCS does not alter the Samba default setting for the
server schannel = yes configuration option.
However, Administrators should check that they have not changed these default manually, e.g. in order to support older clients in their network.
testparm -s 2>1 | grep -i "server schannel"
on all Samba DCs in the domain, there should be no output - the default value of
server schannel = yes is not printed. If
server schannel = no or
server schannel = auto is printed, the domain is vulnerable. The option should be removed from the Samba configuration and the Samba services should be restarted with