Sigred (CVE-2020-1350) Preventing a Wormable Domain Name System Vulnerability in Microsoft Servers • Summer 2020
Total Page:16
File Type:pdf, Size:1020Kb
THREAT BRIEF SigRed (CVE-2020-1350) Preventing a Wormable Domain Name System Vulnerability in Microsoft Servers • Summer 2020 SigRed is a vulnerability in Microsoft’s Domain Name System (DNS) Halting the Spread of Malware Server software that was discovered by security researchers at Check Point. The vulnerability, which has been assigned CVE-2020- Trinity Cyber detects SigRed exploits within a fully parsed DNS 1350, is present in the parsing of specific DNS resource records session by comparing the calculated size of several important fields of the Signature (SIG) type, leading to a buffer overflow and within a SIG resource record query response, which are overflowed Remote Code Execution (RCE). This vulnerability affects Windows during exploitation. Our detection methodology doesn’t rely on DNS servers specifically, and the vulnerable code is present in static indicators like IP addresses or domains and doesn’t rely on Windows OS versions up to 17 years back. Initial proofs-of-concept black or whitelisting to be effective. for scanning vulnerable DNS servers over the internet have been developed by security researchers, and adversaries are undoubtedly When SigRed exploitation is detected, our advanced threat working to develop actual working exploits. prevention service acts immediately by closing the network session. This prevents malicious SigRed responses from exploiting a SigRed is considered “wormable” because it requires no user vulnerable or unpatched Windows DNS server. interaction to trigger, much like BlueKeep, ETERNALBLUE, and SMBGhost exploits that have previously made headlines (all of Trinity Cyber’s immediate actions in flight protect our clients from which Trinity Cyber defeats). These vulnerabilities present a unique SigRed vulnerabilities, even if they haven’t had time to patch their challenge to defenders because they are easily incorporated into DNS servers yet. malware that automatically spread to infect other machines. This can happen via internet-to-internet and even within the boundaries of a corporate network. As an unauthenticated RCE, SigRed presents a massive dilemma—patch quickly, or figure out how to detect and act on vulnerable DNS responses at a network level. [email protected] • (240) 842-9900 • trinitycyber.com © 2020 Trinity Cyber, Inc. CONFIDENTIAL AND PROPRIETARY Trinity Cyber was named a Cool Vendor in Gartner’s Cool Vendors in Network and Endpoint Security, Mark Harris, Rob Smith, et al., 30 September 2020. The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose..