Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-1228 : Security Advisory and Response

Learn about CVE-2020-1228, a denial of service vulnerability in Windows DNS that could allow attackers to disrupt DNS services by sending malicious queries. Find out affected systems and necessary mitigation steps.

A denial of service vulnerability exists in Windows DNS when it fails to properly handle queries. An attacker who successfully exploited this vulnerability could cause the DNS service to become nonresponsive. To exploit the vulnerability, an authenticated attacker could send malicious DNS queries to a target, resulting in a denial of service. The update addresses the vulnerability by correcting how Windows DNS processes queries.

Understanding CVE-2020-1228

What is CVE-2020-1228?

This CVE refers to a denial of service vulnerability in Windows DNS that could lead to nonresponsive DNS services when handling queries.

The Impact of CVE-2020-1228

The impact involves the potential for an attacker to disrupt DNS services by triggering a denial of service through malicious queries.

Technical Details of CVE-2020-1228

Vulnerability Description

        Vulnerability Type: Denial of Service
        Affects: Windows DNS
        Exploitation: Sending malicious DNS queries

Affected Systems and Versions

        Windows Server version 2004: 10.0.0
        Windows Server 2019: 10.0.0
        Windows Server 2019 (Server Core installation): 10.0.0
        Windows Server, version 1909 (Server Core installation): 10.0.0
        Windows Server, version 1903 (Server Core installation): 10.0.0
        Windows Server 2016: 10.0.0
        Windows Server 2016 (Server Core installation): 10.0.0
        Windows Server 2008 Service Pack 2: 6.0.0
        Windows Server 2008 Service Pack 2 (Server Core installation): 6.0.0
        Windows Server 2008 R2 Service Pack 1: 6.1.0
        Windows Server 2008 R2 Service Pack 1 (Server Core installation): 6.0.0
        Windows Server 2012: 6.2.0
        Windows Server 2012 (Server Core installation): 6.2.0
        Windows Server 2012 R2: 6.3.0
        Windows Server 2012 R2 (Server Core installation): 6.3.0

Exploitation Mechanism

The vulnerability is exploited by sending malicious DNS queries to the target, causing the DNS service to become unresponsive.

Mitigation and Prevention

Immediate Steps to Take

        Apply the security update provided by Microsoft to fix the vulnerability.
        Monitor DNS traffic for unusual patterns that may indicate an attack.

Long-Term Security Practices

        Ensure regular security patching for all Windows servers.
        Implement network segmentation and access controls to limit exposure to DNS services.

Patching and Updates

Regularly check for security updates and apply them promptly to prevent exploitation of known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now