Accessibility Skip to content

Poly has joined the HP family! From August 7, 2023, Poly Support contact options will connect you to HP. This portal will be live until November, when we'll move to the HP Customer Support site.

RealPresence Resource Manager - Netlogon Impact

Vulnerability Summary

An elevation of privilege vulnerability exists in Netlogon when an attacker establishes a vulnerable Netlogon secure channel connection to a Microsoft Active Directory domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. As part of their response to this, Microsoft has disabled specific protocols which may be in use for some RPRM customers. For these customers an alternate configuration is needed to restore functionality.

For additional details please see publications from Microsoft



CVE 2020-1472

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'.


Last Update: 3/8/2022
Initial Public Release: 9/24/2020
Advisory ID:  PLYUI20-08

CVE ID: CVE-2020-1472
CVSS Score: 10.0

Product Affected
RealPresence Resource Manager

Prior to 10.3

10.3 and above

The RealPresence Resource Manager (RPRM) will continue to work when secure Netlogon is enabled in Microsoft Active Directory domain controller. 

In RPRM 10.3 or higher, from the Web UI, go to: 

  • Admin -> Directories -> Enterprise Directory
  • Set “Select SMB to connect with the Domain Controller” field to SMB 2.0 and Click Update.



Products running version older than 10.3 will need to upgrade to 10.3 or higher in order to set RPRM to use SMB 2.0 to connect to Domain Controller.

The Poly RealPresence Resource Manager software, release notes, and other documentation for your Poly and Plantronics headsets can be found on the Support site. 


There is no workaround.


Any customer using an affected system who is concerned about this vulnerability within their deployment should contact Poly Technical Support(888) 248-4143, (916) 928-7561, or visit the Poly Support Site.


Revision History
1.0 9/24/2020 Initial Release
2.0 3/8/2022 Format changes 

©2022 Plantronics, Inc. All rights reserved.

Poly, the propeller design, and the Poly logo are trademarks of Plantronics, Inc.  All other trademarks are property of their respective owners. No portion hereof may be reproduced or transmitted in any form or by any means, for any purpose other than the recipient's personal use, without the express written permission of Poly.

While Poly uses reasonable efforts to include accurate and up-to-date information in this document, Poly makes no warranties or representations as to its accuracy. Poly assumes no liability or responsibility for any typographical errors, out of date information, or any errors or omissions in the content of this document. Poly reserves the right to change or update this document at any time. Individuals are solely responsible for verifying that they have and are using the most recent Technical Bulletin. 

Limitation of Liability
Poly and/or its respective suppliers make no representations about the suitability of the information contained in this document for any purpose. Information is provided "as is" without warranty of any kind and is subject to change without notice. The entire risk arising out of its use remains with the recipient. In no event shall Poly and/or its respective suppliers be liable for any direct, consequential, incidental, special, punitive, or other damages whatsoever (including without limitation, damages for loss of business profits, business interruption, or loss of business information), even if Poly has been advised of the possibility of such damages.