Scientists Discover Vulnerability Permitting NTLMv1 Despite Limitations in Active Directory

A team handling cyber safety has uncovered that a specific directive within the Microsoft Active Directory Group Protocol intended to deactivate NT LAN Manager (NTLM) v1 could easily be circumvented as a result of a wrong setup.

A team handling cyber safety has uncovered that a specific directive within the Microsoft Active Directory Group Protocol intended to deactivate NT LAN Manager (NTLM) v1 could easily be circumvented as a result of a wrong setup.
“An uncomplicated misconfiguration within applications on the premises can supersede the Group Protocol, thereby rendering ineffective the directive put in place to prevent NTLMv1 verifications,” noted Dor Segal, a researcher from Silverfort.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.