A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'.
A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'.
Apply updates per vendor instructions.
This vulnerability is currently on the CISA KEV list, which CISA only adds CVEs to when there is reliable evidence of active exploitation in the wild. For federal civilian agencies, BOD 22-01 requires remediation by the due date above. For everyone else, KEV is the strongest "patch immediately" signal you can get from public threat intel.
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows Server | 2019, 2019 (Core installation), 2016, 2016 (Core installation), 2008 for 32-bit Systems Service Pack 2, 2008 for 32-bit Systems Service Pack 2 (Core installation), 2008 for x64-based Systems Service Pack 2, 2008 for x64-based Systems Service Pack 2 (Core installation), 2008 R2 for x64-based Systems Service Pack 1, 2008 R2 for x64-based Systems Service Pack 1 (Core installation), 2012, 2012 (Core installation), 2012 R2, 2012 R2 (Core installation) |
| Microsoft | Windows Server, version 1909 (Server Core installation) | unspecified |
| Microsoft | Windows Server, version 1903 (Server Core installation) | unspecified |
| Microsoft | Windows Server, version 2004 (Server Core installation) | unspecified |
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection: