Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

U.S. Government Agencies Instructed to Patch Wormable Windows Server Flaw

The US Cybersecurity and Infrastructure Security Agency (CISA) has instructed government agencies to immediately address a vulnerability affecting Windows DNS servers.

The US Cybersecurity and Infrastructure Security Agency (CISA) has instructed government agencies to immediately address a vulnerability affecting Windows DNS servers.

The critical vulnerability, tracked as CVE-2020-1350 and dubbed SIGRed, was patched by Microsoft on Tuesday with its security updates for July 2020.

The flaw, which impacts Windows Server versions released in the past 17 years, allows a remote, unauthenticated attacker to run arbitrary code on affected Windows DNS servers using specially crafted requests. Since it’s wormable, it can be exploited by malware to spread without user interaction.

Security researcher Tal Be’ery has described a possible attack scenario involving this weakness.

SIGRed attack

While attacks exploiting SIGRed have yet to be seen, exploitation is not very difficult and the chances of attacks being launched in the coming days are high. That is why users have been advised to install the patches from Microsoft as soon as possible, or at least implement the recommended workaround, which involves a registry modification.

The Emergency Directive 20-03 issued by CISA on Thursday instructs federal agencies to take action as soon as possible to ensure that their servers are protected against attacks exploiting CVE-2020-1350.

“CISA has determined that this vulnerability poses unacceptable significant risk to the Federal Civilian Executive Branch and requires an immediate and emergency action,” reads the directive. “This determination is based on the likelihood of the vulnerability being exploited, the widespread use of the affected software across the Federal enterprise, the high potential for a compromise of agency information systems, and the grave impact of a successful compromise.”

Agencies have been given 24 hours to roll out either the patch or the workaround for SIGRed to all Windows DNS servers. They have been given until July 24 to install the patch and remove the workaround, and until the same date they need to ensure that controls are in place so that newly provisioned servers, or ones that have been disconnected, are updated before they are connected to the government’s networks.

Related: CISA Warns Enterprises of Risks Associated With Tor

Related: Patching Pulse Secure VPN Not Enough to Keep Attackers Out, CISA Warns

Related: CISA Reminds Federal Agencies to Use Its DNS Service

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.