What should I do to be protected against this vulnerability? In addition to applying the updates in this CVE, you will need to disable NTLM as per the guidance as follows: For Azure Active Directory Connect, see Prerequisites for Azure AD Connect For Azure Active Directory Connect Provisioning Agent, see Prerequisites for Azure AD Connect cloud sync What must an attacker do to exploit this vulnerability The attacker must be able to establish Man-in-the-middle between your Azure AD Connect server and a domain controller. The attacker also needs to possess domain user credentials to be able to exploit this vulnerability.
Maturity: Exploit
Sagi Sheinfeld with <a href="https://www.crowdstrike.com/">Crowdstrike</a>, Eyal Karni with <a href="https://www.crowdstrike.com/">Crowdstrike</a>, <a href="https://twitter.com/yaronzi">Yaron Zinar</a> with <a href="https://www.crowdstrike.com/">CrowdStrike</a>