Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

05:40 PM
Connect Directly

Microsoft Patches Wormable RCE Flaw in Windows DNS Servers

Patch Tuesday security updates address a critical vulnerability in Windows DNS Servers, which researchers believe is likely to be exploited.

Microsoft today patched a critical and wormable remote code execution (RCE) vulnerability in the Windows DNS Server that affects Windows Server versions 2003 to 2019. The likelihood of exploitation is high, according to the Check Point researchers who found this 17-year-old flaw.

Windows Domain Name System Server, the Microsoft implementation of DNS servers, is a core component of a Windows Domain environment. CVE-2020-1350, which has a CVSS base score of 10, exists in Windows DNS servers when they fail to properly handle requests. An attacker who successfully exploits it could run arbitrary code in the context of the Local System account.

The vulnerability is wormable, meaning it has the potential to spread between vulnerable DNS servers without user interaction. While there is no evidence the flaw is being used in active attacks, experts are worried it will be. Microsoft has ranked it as 1, or "exploitation more likely."

An attacker could exploit this bug by sending malicious requests to an affected Windows DNS server. Because the service runs with elevated privileges, successful exploitation could grant an attacker domain administrator rights and threaten the entire business network, the Check Point team says in their full report on the bug.

"The attacker would need limited (weak) access to the organization, either by Wi-Fi, malware running on an endpoint, or even a user clicking on a malicious link," says Omri Herscovici, who heads up Check Point's vulnerability research team. "The attacker would then be able to exploit the vulnerability and gain control over the Windows DNS Server." From there, they would be able to access all files, network shares, and emails of employees within the organization, he adds. 

"DNS is obviously a big piece of an organization's critical infrastructure, and it typically resides on a Domain Controller," says Brian Gorenc, senior director of vulnerability research at Trend Micro and head of its Zero Day Initiative. "If an attacker can compromise the Domain Controller, they essentially own your entire domain."

The popularity of Windows DNS Server drives concern. Windows DNS Server is a common platform that often runs on multiple, highly sensitive machines. There may be multiple instances of Windows DNS Server in any organization, all of which could be a potential entry for an attacker. 

Microsoft's patch addresses the bug by changing how Windows DNS servers handle requests. It also offers the workaround of a registry edit, which limits the size of a DNS message (over TCP) to 0xFF00. Because an attack requires large DNS packets, this should prevent exploitation.

A Closer Look at Patching Problems
Security pros urge organizations to patch this flaw immediately.

"You've got to give your vendor every possible chance to fix the bugs they know about," says Dr. Paul Vixie, chairman, CEO, and co-founder of Farsight Security. "If there's a patch, you need an excruciatingly good reason not to apply it immediately."

This is especially relevant for organizations with an all-Windows installed base, running Windows on their desktops and servers, including file servers and DNS servers. "For those shops, this is a problem," he continues. Many botnets start out like this — by infecting a few machines that go on to infect others and drive exponential growth. "The sky is the limit" as to the bad things can happen if a vulnerability like this is successfully exploited, he adds.

Vixie worries about the unattended systems that may not receive the patches they need. These systems typically have one of two structural limitations. For one, they may exist in a highly regulated organization, such as the medical, industrial control, military, or law enforcement sectors. "They can't just say, 'hey there's a problem, let's go fix it,'" Vixie says. "They have to make a plan for how they will eventually get that done." As a result, systems won't be updated.

Some businesses may not be as regulated but simply lack the oversight to know when systems should be patched. As a result, they're left unattended and only when they're infected will someone realize they're out of date. To the extent that this is wormable and a danger to the global economy, he explains, people who detect these systems hold one end of the transaction.

"I'm sure a lot of systems are going to get patched right away — I'm just worried about the ones that won't be," says Vixie. He advises organizations to investigate their shadow IT and conduct an audit for systems they may have forgotten about. The real damage from this vulnerability will occur in the long term and affect neglected systems that were left unpatched, he expects.

Patch Tuesday Fixes Also Worth Noting
CVE-2020-1350 is one of 123 CVEs Microsoft patched as part of its monthly Patch Tuesday rollout. As Trend Micro's ZDI points out, this marks five consecutive months of 110+ patches released and brings the 2020 total up to 742 — not far off from the 851 CVEs fixed in all of 2019.

Eighteen of the vulnerabilities patched this month were critical and, similar to last month, many of them were remote code execution flaws. CVE-2020-1147, for example, is an RCE vulnerability in .NET Framework, Microsoft SharePoint, and Visual Studio that exists when software fails to check the source markup of XML file input. An attacker who exploited this bug could run arbitrary code in the context of the process responsible for deserialization of the XML content.

Another RCE flaw (CVE-2020-1349) exists in Microsoft Outlook when it fails to properly handle objects in memory. A successful attacker could use a specially crafted file to perform actions in the security context of the user. To do this, they could send the file via email and convince their victim to open it; alternatively, they could host a website that contains the specially crafted file. Microsoft notes the vulnerability can be exploited if a victim views the file via Preview Pane.

Richard Melick, senior technical product manager with Automox, points to CVE-2020-1349, as well as CVE-2020-1410, CVE-2020-1374, and CVE-2020-1436 as critical RCE vulnerabilities in services such as Skype, Office, and Remote Desktop Client that could give attackers access to target endpoints as well as the ability to install new programs, modify data, or create user accounts.

"A successful attack with any of these vulnerabilities rely on a victim connecting to a malicious server or accessing an exploited webpage, receiving a malicious file via email, chat, or file sharing, or even clicking the wrong link in an email," Melick says.

Related Content:



Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for detail on conference information and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/13/2020
Where Are the 'Great Exits' in the Data Security Market?
Dave Cole, Cofounder and CEO, Open Raven,  10/13/2020
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-19
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and settin...
PUBLISHED: 2020-10-19
On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administr...
PUBLISHED: 2020-10-19
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malic...
PUBLISHED: 2020-10-19
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malic...
PUBLISHED: 2020-10-19
A flaw was found in Infinispan version 10, where it permits local access to controls via both REST and HotRod APIs. This flaw allows a user authenticated to the local machine to perform all operations on the caches, including the creation, update, deletion, and shutdown of the entire server.