NETWORK ADMINISTRATIONSWindows server

SIGRed: Windows DNS Server Remote Code Execution | Check Point Research

Check Point Research recently discovered a critical vulnerability in the Windows DNS server that affects Windows Server 2003 to 2019, and can be triggered by a malicious DNS response. Due to the fact the service is running in elevated privileges (SYSTEM), if exploited successfully, an attacker would be granted Domain Administrator rights, effectively compromising the entire corporate infrastructure.
For more information visit: https://research.checkpoint.com/2020/resolving-your-way-into-domain-admin:-exploiting-a-17-year-old-bug-in-windows-dns-servers/

Check Point Research on Facebook: facebook.com/CheckpointResearch
Check Point Research on Twitter: twitter.com/_CPResearch_
Check Point Research Podcast channel: research.checkpoint.com/category/cpradio/

source

windows server

Alice AUSTIN

Alice AUSTIN is studying Cisco Systems Engineering. He has passion with both hardware and software and writes articles and reviews for many IT websites.

Leave a Reply

Your email address will not be published. Required fields are marked *