Microsoft is warning everyone about a 17-year-old critical Windows DNS Server vulnerability. It is not classified as ‘wormable’. This whole vulnerability could give a chance to the attackers to create some special malware that can remotely execute codes on Windows servers and these codes can create some malicious DNS queries that can potentially lead to an infrastructure breach of the company.
“Wormable vulnerabilities have the potential to spread via malware between vulnerable computers without user interaction,” explains Mechele Gruhn, a principal security program manager at Microsoft. “Windows DNS Server is a core networking component. While this vulnerability is not currently known to be used in active attacks, it is essential that customers apply Windows updates to address this vulnerability as soon as possible.”
More About Critical Windows DNS Server Vulnerability
The researchers at Check Point had discovered this Critical Windows DNS Server Vulnerability back in May and reported it to Microsoft. The problem is that if these issues are left ignored, it can lead to an attack on the Windows servers.
Microsoft however, said that it has not found anything fishy being happened to the servers because of this whole flaw.
Patch to fix this flaw is available on all supported versions of Windows Server today, it is important for the system administrators to patch the servers as soon as possible because notorious elements would definitely try to target the flaw.
“A DNS server breach is a very serious thing,” warns Omri Herscovici, Check Point’s vulnerability research team leader. “There are only a handful of these vulnerability types ever released. Every organization, big or small using Microsoft infrastructure is at major security risk, if left unpatched. The risk would be a complete breach of the entire corporate network. This vulnerability has been in Microsoft code for more than 17 years; so if we found it, it is not impossible to assume that someone else already found it as well.”
Windows 10 and other client versions of Windows are safe from this whole thing as the flaw only affects Microsoft’s Windows DNS Server implementation.
To protect everyone against this whole flaw, Microsoft is also sending a registry-based workaround to protect against the vulnerability if admins can’t reach to the patch servers quickly.
This whole flaw has got a score of 10 on the Common Vulnerability Scoring System, and that pretty much tells how serious the problem is. Researchers are requesting admins to install the latest updates from Microsoft as soon as possible.
Read the complete blog from Microsoft here.
Read More About