Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26223

7.2HIGH

What is CVE-2024-26223?

The Windows DNS Server is susceptible to a remote code execution vulnerability that could allow an attacker to execute arbitrary code on the affected system. This vulnerability arises due to improper handling of requests by the DNS server, enabling malicious actors to exploit it through specially crafted DNS queries. Exploitation of this vulnerability could result in complete system compromise, including unauthorized access to sensitive data and further exploitation of connected systems. It is crucial for users and organizations to apply security updates promptly, and implement best practices for network security to mitigate potential risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Windows Server 2016 (Server Core installation) x64-based Systems 10.0.14393.0 < 10.0.14393.6897

Windows Server 2016 x64-based Systems 10.0.14393.0 < 10.0.14393.6897

Windows Server 2019 (Server Core installation) x64-based Systems 10.0.17763.0 < 10.0.17763.5696

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.