Rule Category

OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)

Alert Message

OS-WINDOWS Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt

Rule Explanation

This rule looks for a malicious NetrServerAuthenticate3 request encapsulated in an SMB2 request that can exploit ZEROLOGON.

What To Look For

This rule looks for attempts to exploit CVE-2020-1472, aka ZEROLOGON.

Known Usage

No public information

False Positives

No known false positives


Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic: Initial Access

Technique: Exploit Public-Facing Application

For reference, see the MITRE ATT&CK vulnerability types here:

Additional Links

Rule Vulnerability

Authentication Bypass

An Authentication Bypass occurs when there is a way to avoid providing user credentials to a system before performing restricted operations on said system.

CVE Additional Information