What You Need to Know About the Windows DNS Vulnerability - CVE-2020-1350

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=1SpzS0WrNIA



Duration: 43:50
2,946 views
34


Microsoft just released a patch for a critical risk vulnerability in their server implementation of DNS, known as Windows DNS Server: CVE-2020-1350. The vulnerability, known as SIGRed, allows an unauthenticated user to execute code with SYSTEM level privileges on the vulnerable server. As many organizations run the Windows DNS Server on their Active Directory Domain Controllers, this vulnerability can have a significant collateral impact on your internal systems. Microsoft Windows Server 2008 through 2019 are vulnerable.

DNS is a fundamental network protocol used on a daily basis by all internet users. It is often called the "phonebook of the internet", translating domain names to IP addresses. There are many DNS server implementations available and the one we will discuss today is the Microsoft Windows DNS server which has a critical vulnerability: CVE-2020-1350. Other DNS Server implementations are not vulnerable. There is a workaround that does not require a reboot to implement.

References:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350
https://support.microsoft.com/en-us/help/4569509/windows-dns-server-remote-code-execution-vulnerability
https://research.checkpoint.com/2020/resolving-your-way-into-domain-admin-exploiting-a-17-year-old-bug-in-windows-dns-servers/

Speaker: Jorge Orchilles @jorgeorchilles
Jorge Orchilles has been involved in Information Technology since 2001. He began his career as a network and system administrator for a small private high school. Realizing his passion for IT, he founded The Business Strategy Partners in 2002 providing consulting services to residential, small, and medium businesses. While gaining work experience, he was a very involved, full-time student in Florida International University (FIU). He founded the FIU MIS Club and was later contracted to work on the University's Active Directory Migration Project. After successful and on time completion of the project, he was employed by Terremark in 2007, a datacenter and cloud service provider acquired by Verizon. Jorge helped build and secure Terremark's Infrastructure as a Service (IaaS) solution first called Collocation 2.0 and then "The Enterprise Cloud" in 2008.

SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - the Internet Storm Center.

SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - the Internet Storm Center.




Other Videos By SANS Institute


2020-08-07SANS Class Prep Intro - What to complete prior to class
2020-07-30SANS OnDemand Interactive Live Lab Environment Demo: Local & Remote Lab Demonstrations
2020-07-2810 Visibility Gaps Every CISO Must Fill | SANS@MIC Talk
2020-07-28No SQL Injection in MongoDB Applications | SANS@MIC Talk
2020-07-27How to Present Cyber Security Risk to Senior Leadership | SANS Webcast
2020-07-27How to work in ways that will make your boss take notice! | SANS Webcast
2020-07-23Get Involved! Use Your OSINT Powers for Good! | SANS@MIC Talk
2020-07-21smbtimeline - An automated timeline for SMB Traffic | SANS@MIC Talk
2020-07-17Git'ing Users for OSINT: Analysis of All GitHub Users | SANS@MIC Talk
2020-07-16What Do I Need to Know About CVE-2020-5902; the F5 Networks BigIP RCE Vulnerability
2020-07-16What You Need to Know About the Windows DNS Vulnerability - CVE-2020-1350
2020-07-14Course Preview: Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
2020-07-09Checkm8, Checkra1n and the new "golden age" for iOS Forensics | SANS@MIC Talk
2020-07-09Welcome to SANS Community CTF - Services Challenges
2020-07-07The 14 Absolute Truths of Security | SANS@MIC Talk
2020-07-01Defending Lift and Shift Cloud Applications | SANS@MIC Talk
2020-06-30#LevelUpLabs | SANS@MIC Talk
2020-06-30Leveraging Organizational Change to Build a Strong Security Culture
2020-06-26SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
2020-06-26Threat Hunting via DNS | SANS@MIC Talk
2020-06-26No SQL Injection in MongoDB Applications | SANS@MIC Talk



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
CVE-2020-1350
Windows DNS Vulnerability