Microsoft reveals rare 'wormable' bug found in Windows servers - with maximum severity rating
17-year-old Windows Server flaw poses significant and immediate threat
Microsoft has issued a patch for a critical vulnerability found to affect nearly all Windows DNS Server versions.
As confirmed by a blog post from Microsoft Security Response Center, the remote code execution (RCE) flaw is classified as “wormable” for its capacity to let malware spread across the entirety of a corporate network, with crippling effects.
It was handed the maximum severity score of 10.0 by the Common Vulnerability Scoring System (CVSS), highlighting the significant and immediate nature of the threat.
- Check out our list of the best free and public DNS servers around
- VPN vs Cloudflare DNS: Which is best for privacy?
- Here's our list of the best malware removal services out there
The flaw does not affect Windows 10 nor any other consumer implementation - only Windows DNS Server deployments.
'Wormable' Windows flaw
The Windows DNS Server vulnerability was first identified by security researchers at Check Point, who disclosed their discovery to Microsoft in May.
“A DNS server breach is a very serious thing. There are only a handful of these vulnerability types ever released,” said Omri Herscovici, Research Team Leader at Check Point.
“Every organization big or small using Microsoft infrastructure is at major security risk, if left unpatched. The risk would be a complete breach of the entire corporate network.”
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Microsoft has now issued a patch for all Windows DNS Server versions, which system administrators are advised to apply immediately - although it is thought the bug is yet to be exploited in the wild.
“Wormable vulnerabilities have the potential to spread via malware between vulnerable computers without user interaction. Windows DNS Server is a core networking component,” explained Mechele Gruhn of Microsoft Security Response Center.
“While this vulnerability is not currently known to be used in active attacks, it is essential that customers apply Windows updates to address this vulnerability as soon as possible.”
Gruhn goes on to explain that, if circumstances mean an update is impractical, a workaround is available that does not involve restarting the server. Administrators that lean on the automatic updates facility, meanwhile, need take no further action.
- Here's our list of the best antivirus software on the market
Via The Verge
Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He's responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.