Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

U.S. Government Agencies Instructed to Patch Wormable Windows Server Flaw

The US Cybersecurity and Infrastructure Security Agency (CISA) has instructed government agencies to immediately address a vulnerability affecting Windows DNS servers.

The US Cybersecurity and Infrastructure Security Agency (CISA) has instructed government agencies to immediately address a vulnerability affecting Windows DNS servers.

The critical vulnerability, tracked as CVE-2020-1350 and dubbed SIGRed, was patched by Microsoft on Tuesday with its security updates for July 2020.

The flaw, which impacts Windows Server versions released in the past 17 years, allows a remote, unauthenticated attacker to run arbitrary code on affected Windows DNS servers using specially crafted requests. Since it’s wormable, it can be exploited by malware to spread without user interaction.

Security researcher Tal Be’ery has described a possible attack scenario involving this weakness.

SIGRed attack

While attacks exploiting SIGRed have yet to be seen, exploitation is not very difficult and the chances of attacks being launched in the coming days are high. That is why users have been advised to install the patches from Microsoft as soon as possible, or at least implement the recommended workaround, which involves a registry modification.

The Emergency Directive 20-03 issued by CISA on Thursday instructs federal agencies to take action as soon as possible to ensure that their servers are protected against attacks exploiting CVE-2020-1350.

“CISA has determined that this vulnerability poses unacceptable significant risk to the Federal Civilian Executive Branch and requires an immediate and emergency action,” reads the directive. “This determination is based on the likelihood of the vulnerability being exploited, the widespread use of the affected software across the Federal enterprise, the high potential for a compromise of agency information systems, and the grave impact of a successful compromise.”

Agencies have been given 24 hours to roll out either the patch or the workaround for SIGRed to all Windows DNS servers. They have been given until July 24 to install the patch and remove the workaround, and until the same date they need to ensure that controls are in place so that newly provisioned servers, or ones that have been disconnected, are updated before they are connected to the government’s networks.

Advertisement. Scroll to continue reading.

Related: CISA Warns Enterprises of Risks Associated With Tor

Related: Patching Pulse Secure VPN Not Enough to Keep Attackers Out, CISA Warns

Related: CISA Reminds Federal Agencies to Use Its DNS Service

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

Former Wiz executive Trish Cagliostro has joined Orchid Security as Chief Revenue Officer.

Transcend has named former UnitedHealth Group CISO Aimee Cardwell as CISO in Residence.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.