CVE-2020-1472 CRITICAL — CVSS 10.0

Zerologon (CVE-2020-1472) Scanner

Free instant check: is your website vulnerable to CVE-2020-1472? Windows Netlogon flaw disclosed in 2020. Affects millions of systems worldwide. Check now — 60 seconds, no signup.

🔍

✓ No signup · ✓ 60 second results · ✓ Checks CVE-2020-1472 specifically

What is CVE-2020-1472 (Zerologon)?

Authentication bypass allowing instant domain compromise via Netlogon cryptographic flaw.

Disclosed in 2020, CVE-2020-1472 affects Windows Netlogon and carries a CVSS score of 10.0 (CRITICAL). Despite patches being available, automated scanning continues to find unpatched systems years after initial disclosure.

10.0
CVSS Score
CRITICAL
Severity
2020
Year Disclosed

How to Check if You're Vulnerable to CVE-2020-1472

  1. Enter your domain in the free scanner above
  2. Click "Check Now" — no signup required
  3. VulnScan scans your Windows Netlogon installation for CVE-2020-1472 indicators
  4. Results in 60 seconds — free security grade included

Frequently Asked Questions — CVE-2020-1472

What is CVE-2020-1472 (Zerologon)?

Authentication bypass allowing instant domain compromise via Netlogon cryptographic flaw.

How do I check if my website is vulnerable to CVE-2020-1472?

Enter your domain in VulnScan above. Our scanner checks for CVE-2020-1472 indicators and Windows Netlogon version fingerprinting. Results in 60 seconds, no signup required.

Is CVE-2020-1472 still actively exploited?

Yes. Automated exploit kits continue targeting unpatched Windows Netlogon systems worldwide. The CVSS score of 10.0 reflects the severity of exploitation. Patch immediately and verify with an external scan.

Don't wait — check for CVE-2020-1472 now

Free scan in 60 seconds. No signup, no credit card.

Also Check For These Critical Vulnerabilities

CVE-2021-44228 — Log4ShellCVE-2021-45046 — Log4j2 BypassCVE-2023-44487 — HTTP/2 Rapid ResetCVE-2023-23397 — Outlook NTLM LeakCVE-2021-26084 — Confluence RCECVE-2022-22965 — Spring4ShellCVE-2022-30190 — Follina MSDTCVE-2021-34527 — PrintNightmare Full Vulnerability Scanner →