Windows DNS flaw allows hackers to seize control of corporate servers
Businesses are urged to patch the critical 17-year-old bug present in Window Server versions 2003 to 2019
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Hackers can exploit a critical vulnerability in the Windows DNS server to gain domain administrator rights over company assets, spread malware silently, and compromise an entire corporate infrastructure.
Companies are being advised to urgently patch their systems to protect against a wormable flaw, assigned CVE-2020-1350, and dubbed SIGRed, which affects Windows Server versions from 2013 to 2019.
The flaw has been rated 10/10 on the CVSS scale too, according to cyber security experts with Check Point Research (CPR), meaning it’s highly dangerous, highly exploitable, and relatively straightforward to execute.
The flaw lies in the way the Windows DNS server parses incoming DNS queries, triggering a heap-based memory buffer overflow. This allows cyber criminals to create malicious DNS queries to Windows DNS servers and take control.
Exploiting the vulnerability can allow hackers to seize control of corporate servers by gaining administrative rights, and eventually compromise a company’s entire IT infrastructure. From here, attackers can intercept and manipulate corporate emails and network traffic, make services unavailable, harvest user credentials, and do much more.
“A DNS server breach is a critical issue,” said CPR’s vulnerability research team leader Omri Herscovici. “Most of the time, it puts the attacker just one inch away from breaching the entire organization.
"There are only a handful of these vulnerability types ever released. Every organization, big or small using Microsoft infrastructure is at major security risk if this flaw is left unpatched.”
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
RELATED RESOURCE
Enhancing subscriber services through DNS
Easily expand delivery of value-added security services through a cost-effective DNS-based approach
The vulnerability has been in Microsoft code for more than 17 years, Herscovici added, meaning that if his team found it, it’s not impossible to assume others with more malicious intent already have as well. His team’s findings also show that no matter how secure enterprises may feel they are, there are always more security issues out there waiting to be discovered and exploited.
The SIGRed vulnerability is on par with the likes of EternalBlue, also known as WannaCry, and BlueKeep, which exploited Microsoft’s Server Message Block (SMB) and Remote Desktop Protocol (RDP) respectively. Herscovici continued to say businesses should urgently patch their systems to avoid falling victim.
CPR disclosed its findings to Microsoft on 19 May, before the company acknowledged the security flaw and issued a patch as part of the latest Patch Tuesday, on 14 July 2020. Beside assigning SIGRed the highest possible CVSS score, Microsoft deemed it wormable, meaning the vulnerability is capable of spreading across a network silently and without any user interaction.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Acer marks 50th birthday with AI-powered TravelMate P2 and P4 modelsNews TravelMate finally gets its upgrade to AI PC, as Acer reaffirms its commitment to SMBs
-
Canon imageFORMULA DR-C350 reviewReviews If you're after a compact document scanner for general archiving or front desk work, Canon's ImageFORMULA DR-C350 could fit the bill
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches