

- #Emergency 20 patch update
- #Emergency 20 patch Patch
- #Emergency 20 patch software
- #Emergency 20 patch code
Department-level Chief Information Officers (CIOs) or equivalents must submit completion reports attesting to CISA that the applicable update has been applied to all affected servers and provide assurance that newly provisioned or previously disconnected servers will be patched as required by this directive prior to network connection (per Action 1). By 11:59 PM EDT, Wednesday, September 23, 2020, submit a completion report using the provided template. These requirements apply to Windows Servers with the Active Directory domain controller role in any information system, including an information system used or operated by another entity on behalf of an agency, that collects, processes, stores, transmits, disseminates, or otherwise maintains agency information.Ī. In addition to agencies using their vulnerability scanning tools for this task, CISA recommends that agencies use other means to confirm that the update has been properly deployed. By 11:59 PM EDT, Monday, September 21, 2020, ensure technical and/or management controls are in place to ensure newly provisioned or previously disconnected domain controller servers are updated before connecting to agency networks. If affected domain controllers cannot be updated, ensure they are removed from the network.ī. Apply the August 2020 Security Update to all Windows Servers with the domain controller role.

Update all Windows Servers with the domain controller role by 11:59 PM EDT, Monday, September 21, 2020,Ī. This emergency directive requires the following actions:
#Emergency 20 patch code
the availability of the exploit code in the wild increasing likelihood of any upatched domain controller being exploited.This determination is based on the following: The vulnerability in Microsoft Windows Netlogon Remote Protocol (MS-NRPC), a core authentication component of Active Directory, could allow an unauthenticated attacker with network access to a domain controller to completely compromise all Active Directory identity services.Īpplying the update released on August 11 to domain controllers is currently the only mitigation to this vulnerability (aside from removing affected domain controllers from the network).ĬISA has determined that this vulnerability poses an unacceptable risk to the Federal Civilian Executive Branch and requires an immediate and emergency action.


#Emergency 20 patch software
On August 11, 2020, Microsoft released a software update to mitigate a critical vulnerability in Windows Server operating systems ( CVE-2020-1472). These directives do not apply to statutorily-defined “national security systems” nor to systems operated by the Department of Defense or the Intelligence Community. § 655(3).įederal agencies are required to comply with these directives. Section 2205(3) of the Homeland Security Act of 2002, as amended, delegates this authority to the Director of the Cybersecurity and Infrastructure Security Agency. Code, authorizes the Secretary of Homeland Security, in response to a known or reasonably suspected information security threat, vulnerability, or incident that represents a substantial threat to the information security of an agency, to “issue an emergency directive to the head of an agency to take any lawful action with respect to the operation of the information system, including such systems used or operated by another entity on behalf of an agency, that collects, processes, stores, transmits, disseminates, or otherwise maintains agency information, for the purpose of protecting the information system from, or mitigating, an information security threat.” 44 U.S.C.
#Emergency 20 patch Patch
This page contains a web-friendly version of the Cybersecurity and Infrastructure Security Agency’s Emergency Directive 20-04, “ Mitigate Netlogon Elevation of Privilege Vulnerability from August 2020 Patch Tuesday”.
