First published: Tue Jul 14 2020(Updated: )
A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 | ||
=sp2 | ||
=r2-sp1 | ||
=r2 | ||
=1903 | ||
=1909 | ||
=2004 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-1350 is rated as critical due to its potential for remote code execution.
To fix CVE-2020-1350, install the latest security patches provided by Microsoft for affected Windows Server versions.
CVE-2020-1350 affects multiple versions including Windows Server 2008, 2012, 2016, 2019, and their respective service packs.
Yes, CVE-2020-1350 can be exploited remotely by sending crafted DNS requests to vulnerable Windows DNS servers.
If using an affected version as per CVE-2020-1350, it is important to apply security updates immediately to mitigate the risk.