Windows DNS Server Remote Code Execution Vulnerability
Image Description
Common Information
Type Value
UUID 25ca3302-2c93-47c3-b5f5-4821ec11b08f
Fingerprint da5af45d0fefc4dffbe5c4da5faf3b9375d0284951cb3ff651ead4d0c0867557
Analysis status DONE
Considered CTI value 0
Text language
Published July 15, 2020, 11:53 a.m.
Added to db March 10, 2024, 11:29 a.m.
Last updated Aug. 31, 2024, 4:17 a.m.
Headline Windows DNS Server Remote Code Execution Vulnerability
Title Windows DNS Server Remote Code Execution Vulnerability
Detected Hints/Tags/Attributes 19/1/13
Attributes
Details Type #Events CTI Value
Details CVE 22
cve-2020-1350
Details Domain 80
portal.msrc.microsoft.com
Details Domain 128
support.microsoft.com
Details Domain 34
msrc-blog.microsoft.com
Details Domain 280
thehackernews.com
Details Domain 141
research.checkpoint.com
Details File 1
windows-dns-server-hacking.html
Details Url 2
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2020-1350
Details Url 1
https://support.microsoft.com/en-us/help/4569509/windows-dns-server-remote-code-execution-
Details Url 1
https://msrc-blog.microsoft.com/2020/07/14/july-2020-security-update-cve-2020-1350-
Details Url 1
https://thehackernews.com/2020/07/windows-dns-server-hacking.html
Details Url 1
https://research.checkpoint.com/2020/resolving-your-way-into-domain-admin-exploiting-a-17-
Details Windows Registry Key 3
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters