Windows DNS Server Remote Code Execution Vulnerability

Scheduled Maintenance Report for ASPEX - Statuspage

Completed

The scheduled maintenance has been completed.
Posted Jul 15, 2020 - 23:01 CEST

In progress

Scheduled maintenance is currently in progress. We will provide updates as necessary.
Posted Jul 15, 2020 - 20:00 CEST

Scheduled

Yesterday, Microsoft released a patch for a vulnerability in their Windows DNS Server. It has received an CVSS score of 10. This is the highest number possible, so very critical.

We will install the necessary patches on our DNS infrastructure this evening through emergency procedures.

More information about the vulnerability can be found on:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350
https://support.microsoft.com/en-us/help/4569509/windows-dns-server-remote-code-execution-vulnerability
https://msrc-blog.microsoft.com/2020/07/14/july-2020-security-update-cve-2020-1350-vulnerability-in-windows-domain-name-system-dns-server/
Posted Jul 15, 2020 - 16:03 CEST
This scheduled maintenance affected: ASPEX Datacenter (Servers / Virtual Machines).