A newly identified Denial-of-Service (DoS) vulnerability—CVE‑2025‑47978, dubbed "NOTLogon"—has emerged in Microsoft’s Kerberos protocol stack, affecting Netlogon authentication services in Windows Domain Controllers.
🧨 A low-privileged machine on the network can craft a malicious Kerberos authentication request that causes a reboot or crash of the Windows Domain Controller.
This results in:
🧠 Similar in naming to the infamous “Zerologon,” but NOTLogon is DoS-oriented, not privilege escalation.
The flaw lies in how Netlogon processes authentication packets. An input validation failure in the Kerberos handshake can trigger:
Sources: Secure-ISS, The Hacker News, SecurityWeek
✅ Microsoft has issued a fix in July 2025’s Patch Tuesday update.
Immediate Recommendations:
This vulnerability is a strong reminder that DoS attacks are not just low-level nuisances — they can take down the very heart of enterprise infrastructure.💡 Stay patched, stay isolated, and monitor your domain traffic!🔔 Subscribe to our updates at cyberdudebivash.com
📢 Follow us on LinkedIn for breaking cyber alerts & tools!
#Kerberos #NOTLogon #CVE202547978 #ActiveDirectory #PatchTuesday #CyberDudeBivash #CybersecurityAlert #DoSAttack #WindowsSecurity