Microsoft has pushed out the second half of the software patch for the “Zerologon” privilege escalation vulnerability in the Windows Netlogon Remote Protocol more than five months after the first half was issued. The first phase of the patch was intended to address the vulnerability on two fronts: blocking both Windows-based domain members and non-Windows PCs that have been configured to disable signing/encryption. Adobe issued a patch Tuesday for a vulnerability, CVE-2021-21017, in Adobe Acrobat and Reader.”]
Source: https://www.cuinfosecurity.com/microsoft-issues-second-patch-for-netlogon-vulnerability-a-15970

