Scientists Discover Vulnerability Permitting NTLMv1 Despite Limitations in Active Directory
A team handling cyber safety has uncovered that a specific directive within the Microsoft Active Directory Group Protocol intended to deactivate NT LAN Manager (NTLM) v1 could easily be circumvented as a result of a wrong setup.
“An uncomplicated misconfiguration within applications on the premises can supersede the Group Protocol, thereby rendering ineffective the directive put in place to prevent NTLMv1 verifications,” noted Dor Segal, a researcher from Silverfort.
“An uncomplicated misconfiguration within applications on the premises can supersede the Group Protocol, thereby rendering ineffective the directive put in place to prevent NTLMv1 verifications,” noted Dor Segal, a researcher from Silverfort.
