One Article Review

Accueil - L'article:
Source CSO.webp CSO
Identifiant 1905644
Date de publication 2020-09-03 11:43:00 (vue: 2020-09-08 16:05:29)
Titre BrandPost: SIGRed: What Is It, How Serious Is It, and How Should You Respond?
Texte Executive SummaryOn July 14th, 2020, Microsoft disclosed a vulnerability in the Microsoft DNS Server subsystem affecting all modern versions of Microsoft DNS. This vulnerability allows attackers to leverage malformed DNS responses to trigger remote code execution on unpatched Microsoft DNS servers without the need for authentication. A sufficiently capable attacker can leverage this vulnerability to obtain remote administrative access to Microsoft DNS Servers, which typically cohabitate with Microsoft Active Directory servers.In other words this vulnerability bypasses the majority of built-in security checks and security architecture while providing direct access to an organization's critical infrastructure. Additionally this vulnerability is "wormable", indicating that the attack is easily automated and can spread without user intervention via malware.
Envoyé Oui
Condensat 14th 2020 access active additionally administrative affecting all allows architecture article attack attacker attackers authentication automated brandpost: built bypasses can capable checks click code cohabitate critical direct directory disclosed dns easily execution executive full here how indicating infrastructure intervention july leverage majority malformed malware microsoft modern need obtain organization other please providing read remote respond responses security serious server servers should sigred: spread subsystem sufficiently summaryon trigger typically unpatched user versions vulnerability what which without words wormable
Tags Vulnerability
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: