Accessibility Skip to content

RealPresence Resource Manager - Netlogon Impact

Vulnerability Summary

An elevation of privilege vulnerability exists in Netlogon when an attacker establishes a vulnerable Netlogon secure channel connection to a Microsoft Active Directory domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. As part of their response to this, Microsoft has disabled specific protocols which may be in use for some RPRM customers. For these customers an alternate configuration is needed to restore functionality.

For additional details please see publications from Microsoft

 

Details

CVE 2020-1472

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'.

Published

Last Update: 3/8/2022
Initial Public Release: 9/24/2020
Advisory ID:  PLYUI20-08

CVE ID: CVE-2020-1472
CVSS Score: 10.0
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Product Affected
PRODUCTS FIRMWARE FIX
RealPresence Resource Manager

Prior to 10.3

10.3 and above
Solution

The RealPresence Resource Manager (RPRM) will continue to work when secure Netlogon is enabled in Microsoft Active Directory domain controller. 

In RPRM 10.3 or higher, from the Web UI, go to: 

  • Admin -> Directories -> Enterprise Directory
  • Set “Select SMB to connect with the Domain Controller” field to SMB 2.0 and Click Update.

 

 

Products running version older than 10.3 will need to upgrade to 10.3 or higher in order to set RPRM to use SMB 2.0 to connect to Domain Controller.

The Poly RealPresence Resource Manager software, release notes, and other documentation for your Poly and Plantronics headsets can be found on the Support site. 

 
Workaround

There is no workaround.

Contact

Any customer using an affected system who is concerned about this vulnerability within their deployment should contact Poly Technical Support(888) 248-4143, (916) 928-7561, or visit the Poly Support Site.

 

Revision History
VERSION DATE DESCRIPTION
1.0 9/24/2020 Initial Release
2.0 3/8/2022 Format changes