Microsoft Vulnerability in Windows DNS
Today Microsoft announced a Critical Remote Code Execution (RCE) vulnerability in Windows DNS Server that is classified as a ‘wormable’ vulnerability and has a CVSS base score of 10.0.
This issue results from a flaw in Microsoft’s DNS server role implementation and affects all Windows Server versions. Non-Microsoft DNS Servers are not affected.
Wormable vulnerabilities have the potential to spread via malware between vulnerable computers without user interaction. Windows DNS Server is a core networking component.
While this vulnerability is not currently known to be used in active attacks, Microsoft have advised that it is essential that Microsoft customers apply Windows updates to address this vulnerability as soon as possible.
If applying the update quickly is not practical, a registry-based workaround is available that does not require restarting the server. The update and the workaround are both detailed in CVE-2020-1350.
Check Point, who discovered the vulnerability, also strongly recommend users to patch their affected Windows DNS Servers in order to prevent the exploitation of this vulnerability. They have outlined further technical detail in their research blog.
Below are the links to further information about the vulnerability. We recommend you review this information if you are concerned about the impact to your business. We will continue to monitor the situation and update this webpage as new information becomes available.
Integrity360 clients can email their account manager to query anything related to this vulnerability. Alternatively, please email firstname.lastname@example.org and we will arrange a follow up for you. As always, Integrity360 Managed Security Service customers will be covered through our proactive security approach.