SIGRed: Windows DNS Server Remote Code Execution | Check Point Research
Check Point Research recently discovered a critical vulnerability in the Windows DNS server that affects Windows Server 2003 to 2019, and can be triggered by a malicious DNS response. Due to the fact the service is running in elevated privileges (SYSTEM), if exploited successfully, an attacker would be granted Domain Administrator rights, effectively compromising the entire corporate infrastructure.
For more information visit: https://research.checkpoint.com/2020/resolving-your-way-into-domain-admin:-exploiting-a-17-year-old-bug-in-windows-dns-servers/
Check Point Research on Facebook: facebook.com/CheckpointResearch
Check Point Research on Twitter: twitter.com/_CPResearch_
Check Point Research Podcast channel: research.checkpoint.com/category/cpradio/
windows server