→ Applies to: SynetoOS 4.x
Microsoft has published information about a Netlogon and elevation of privilege vulnerability, covered by CVE-2020-1472.
The highlighted patches are the standard monthly patches (monthly rollups, security-only bundles, cumulative updates, etc.), but according to the FAQ section of the CVE page, additional steps are needed to protect against the vulnerability.
The impact of this patch is that shares are not accessible by their IP, only by hostname with some limitations.
Step 1. Connect to the Windows VM
Step 2. Open DNS Manager
Step 3. Click on Forward Lookup Zones
IMPORTANT
If in "Forward Lookup Zones" there is no entry with the hostname assigned to SynetoOS, you need to add a new entry.
Step 4. Run gpedit.msc and click ok
Step 5. Expand Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options
Step 6. Right click and choose Properties on “Domain controller: Allow vulnerable Netlogon secure channel connections”
Step 7. Click on Edit Security and Add
Step 8. Click on Object Types
Step 9. Select Computers only and press OK
Step 10. Enter the SynetoOS hostname, click on Check Names and press OK