diff --git a/monkey/monkey_island/cc/ui/src/components/report-components/SecurityReport.js b/monkey/monkey_island/cc/ui/src/components/report-components/SecurityReport.js index 3ba443e32..873249f66 100644 --- a/monkey/monkey_island/cc/ui/src/components/report-components/SecurityReport.js +++ b/monkey/monkey_island/cc/ui/src/components/report-components/SecurityReport.js @@ -370,16 +370,23 @@ class ReportPageComponent extends AuthComponent { if (this.state.report.overview.issues[this.Issue.ZEROLOGON_PASSWORD_RESTORE_FAILED]) { zerologonOverview.push( Automatic password restoration on a domain controller failed! - + ) } if(this.state.report.overview.issues[this.Issue.ZEROLOGON]) { zerologonOverview.push(<> - Some domain controllers are vulnerable to Zerologon exploiter( - - CVE-2020-1472)! - ) + Some domain controllers are vulnerable to Zerologon exploiter( + )! + ) } else { return none; } @@ -936,15 +943,28 @@ class ReportPageComponent extends AuthComponent {
The attack was possible because the latest security updates from Microsoft have not been applied to this machine. For more information about this - vulnerability, read - Microsoft's documentation. + vulnerability, read + {!issue.password_restored ?

The domain controller's password was changed during the exploit and could not be restored successfully. - Instructions on how to manually reset the domain controller's password can be found here. + Instructions on how to manually reset the domain controller's password can be found + .
: null}