Microsoft has announced that it has patched a 17-year-old exploit in Windows Server. The news was revealed yesterday in a security update. The security flaw was originally discovered by Check Point.
The exploit was classed as a ‘wormable’ vulnerability which could be used to spread malware. You can find out more details below.
Today we released an update for CVE-2020-1350, a Critical Remote Code Execution (RCE) vulnerability in Windows DNS Server that is classified as a ‘wormable’ vulnerability and has a CVSS base score of 10.0. This issue results from a flaw in Microsoft’s DNS server role implementation and affects all Windows Server versions. Non-Microsoft DNS Servers are not affected.
Wormable vulnerabilities have the potential to spread via malware between vulnerable computers without user interaction. Windows DNS Server is a core networking component. While this vulnerability is not currently known to be used in active attacks, it is essential that customers apply Windows updates to address this vulnerability as soon as possible.
Understanding the Severity of the Vulnerability
The classification of the vulnerability as ‘wormable’ is particularly concerning. Wormable vulnerabilities can propagate themselves across networks without any user intervention, making them highly dangerous. This specific vulnerability, identified as CVE-2020-1350, has a CVSS base score of 10.0, which is the highest possible score, indicating its critical nature. The flaw lies in the Windows DNS Server, a fundamental component of Windows Server operating systems that is responsible for translating domain names into IP addresses.
The potential impact of this vulnerability is vast, affecting all versions of Windows Server. If exploited, it could allow attackers to execute arbitrary code on the affected servers, potentially leading to a complete system compromise. This could result in unauthorized access to sensitive data, disruption of services, and further propagation of malware across the network.
Steps Taken by Microsoft and Recommendations for Users
Microsoft has acted swiftly to address this critical issue by releasing a security update. The company has emphasized the importance of applying this update immediately to mitigate the risk. Although there are no known active exploits of this vulnerability at the time of the announcement, the potential for future attacks remains high.
For users and administrators, it is crucial to ensure that all Windows Server instances are updated with the latest patches. Microsoft has provided detailed guidance on how to apply the update and has made it available through their regular update channels. Additionally, administrators should review their network security measures and consider implementing additional safeguards, such as network segmentation and intrusion detection systems, to further protect against potential exploits.
You can find out more information about this security flaw over at Microsoft’s website at the link below.
Latest Geeky Gadgets Deals
Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.