What We Do
How we do it
Resources
Company
ABOUT ESENTIRE
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
LATEST PRESS RELEASE
Sep 20, 2022
eSentire Recognized as Top Global MDR Provider by MSSP Alert, CrowdStrike and G2
Waterloo, ON - September 21, 2022 – eSentire, Inc., the Authority in Managed Detection and Response (MDR), celebrated multiple industry recognitions as the leading global MDR provider, over the last week: Named #9, and the top pure play MDR provider on MSSP Alert’s Top 250 MSSPs global rankingRecognized as the CrowdStrike 2022 Global MSSP Partner of the Year Earned G2’s industry-renowned status…
Read More
Partners
PARTNER PROGRAM
e3 Ecosystem
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Learn more
ECOSYSTEM PARTNER RESOURCES
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Search
Resources
Security advisories — Jul 14, 2020

SigRed CVE-2020-1350

1 minute read
Speak With A Security Expert Now

UPDATE:

As of July 14th, 2020, proof of concept exploit code for a denial of service attack has been identified in the wild. This release increases the immediate need to apply security patches before exploitation occurs.

THE THREAT:

On Tuesday, July 14, 2020 Microsoft released patches for a critical vulnerability affecting Windows Server versions 2003 to 2019 [1]. The vulnerability (CVE-2020-1350) has been dubbed SigRed and allows for remote code execution. If exploited a remote and unauthenticated attacker could gain Local System privileges on vulnerable servers and exfiltrate information or distribute malicious content. SigRed is highly concerning as the vulnerability is believed to be wormable, meaning that threat actors could automate attacks to spread between vulnerable systems.

Exploitation of SigRed has not been identified in the wild at this time but it is highly recommended that organizations immediately apply security patches due to the high impact of this vulnerability. The criticality of SigRed is likely to attract attacker attention and may result in exploitation in the near future.

What we’re doing about it

What you should do about it

Additional information

CVE-2020-1350 aka SigRed impacts Windows Domain Name System servers version 2003 to 2019. The vulnerability is remotely exploitable and considered “wormable” and received 10/10 rating on the CVSS scale.

The vulnerability can be exploited by sending a specially crafted DNS query to a vulnerable DNS server. The result is arbitrary code execution in the context of the Local System Account and per Microsoft “could lead to significant service interruptions and the compromise of high level domain accounts” as Domain Controllers are often configured to act as DNS servers.

As noted by Microsoft, the DNS Windows Client is not impacted by this vulnerability.

The vulnerability was discovered by a researcher at Check Point. Their report is expected to be released later on July 14 2020 [3]. Disclosure of technical details surrounding the vulnerability would expedite exploit development by other parties.

Organizations are encouraged to apply the security updates or workarounds as soon as possible.

References:

[1] https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350

[2] https://support.microsoft.com/en-gb/help/4569509/windows-dns-server-remote-code-execution-vulnerability

[3] https://twitter.com/_CPResearch_/status/1283087717174214664

Join 100,000+ Security Leaders

Get notified when there's a new security advisory, and receive the latest news, intel and helpful tools & assets. You can unsubscribe anytime.

By clicking the button below I confirm that I have read and agree to the eSentire privacy policy.

View Most Recent Blogs