PowerScale: Netlogon RPC Elevation of Privilege Vulnerability (CVE-2022-38023)

概要: CVE-2022-38023 has no functional impact on PowerScale clients. OneFS should be upgraded to 9.5 or later to use AES cryptography for Netlogon.

この記事は次に適用されます: この記事は次には適用されません: この記事は、特定の製品に関連付けられていません。 すべての製品パージョンがこの記事に記載されているわけではありません。

現象

PowerScale OneFS uses Netlogon as a secure channel to communicate with Active Directory. This article provides some information about the impact of CVE-2022-38023 on PowerScale OneFS.

Here is the Microsoft Security Vulnerability announcement for CVE-2022-38023, Netlogon RPC Elevation of Privilege VulnerabilityThis hyperlink is taking you to a website outside of Dell Technologies.  

Microsoft released an update on November 8, 2022 that introduced the following system registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\RequireSeal

That has three values:

0 – Disabled
1 – Compatibility mode. Windows domain controllers will require that Netlogon clients use RPC Seal if they are running Windows, or if they are acting as either domain controllers or Trust accounts.
2 - Enforcement mode. All clients are required to use RPC Seal, unless they are added to the "Domain Controller: Allow vulnerable Netlogon secure channel connections” group policy object (GPO).

PowerScale OneFS, by default, signs, and seals the Netlogon secure channel connection Requiring Netlogon sealing due to CVE-2022-38023 does not impact PowerScale OneFS.

You may see the following events logged in the Windows Event Viewer of the domain controllers:

Event ID 5840 
Event Text  The Netlogon service created a secure channel with a client with RC4. 
 

A New Event ID 5840 is created with PowerScale clients running OneFS releases 9.4.x and earlier which use RC4 by default for NTLM Netlogon Secure Channel.

A New Event ID 5840 is not created with PowerScale OneFS clients running releases 9.5.0 and later. PowerScale OneFS 9.5.0 uses AES cryptography for NTLM Netlogon.

原因

Microsoft introduced a phased approach for requiring sealing of Netlogon communication.

解決方法

These updates to Windows by Microsoft to address CVE-2022-38023 have no functional impact to PowerScale OneFS clients running any supported release since 7.x.

To take advantage of AES cryptography for NTLM Netlogon Secure Channel in OneFS, upgrade to PowerScale OneFS release 9.5.0 or later.

The support of AES cryptography for NTLM Netlogon Secure Channel is not being backported to PowerScale OneFS releases 9.4.x and earlier.

Related Resources
Here are recommended resources related to this topic that may be of interest:

その他の情報

The following registry value does not apply by default and does not cause any authentication failures unless deliberately enabled:

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Netlogon\Parameters\RejectMd5Clients

If the value is deliberately set to TRUE (1), this does result in NTLM authentication failures on OneFS releases 9.4.x and earlier.

Verify the setting by running the following PowerShell command:

Get-ItemPropertyValue -Path HKLM:\SOFTWARE\Policies\Microsoft\Netlogon\Parameters -Name RejectMd5Clients

Example output of it being enabled:

Output of above command being enabled

For OneFS 9.4 and earlier and if the RejectMd5Clients value is enabled, you see similar errors in /var/log/lsassd.log for a failed NTLM authentication:

2023-05-03T10:55:18.847247-06:00 <30.4> vd9400-1(id1) lsass[24440]: [lsass] Failed to get Ntlm Target Info Type for 'TRUSTED.INT' Error code: 40134 (symbol: LW_ERROR_RPC_ERROR)
2023-05-03T10:55:18.855332-06:00 <30.3> vd9400-1(id1) lsass[24440]: [lsass] AD_NetrlogonOpenSchannel(WIN-871N98FR.trusted.int) failed with 3221226376 (0xc0000388) (symbol: 'STATUS_DOWNGRADE_DETECTED')
2023-05-03T10:55:18.855438-06:00 <30.3> vd9400-1(id1) lsass[24440]: [lsass] Failed to authenticate user (name = 'administrator') -> error = 40134, symbol = LW_ERROR_RPC_ERROR, client pid = 4294967295
文書のプロパティ
文書番号: 000207527
文書の種類: Solution
最終更新: 01 5月 2024
バージョン:  7
質問に対する他のDellユーザーからの回答を見つける
サポート サービス
お使いのデバイスがサポート サービスの対象かどうかを確認してください。