Windows DNS Server Remote Code Execution Vulnerability
Scheduled Maintenance Report for ASPEX - Statuspage
Completed
The scheduled maintenance has been completed.
Posted Jul 15, 2020 - 23:01 CEST
In progress
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Posted Jul 15, 2020 - 20:00 CEST
Scheduled
Yesterday, Microsoft released a patch for a vulnerability in their Windows DNS Server. It has received an CVSS score of 10. This is the highest number possible, so very critical.

We will install the necessary patches on our DNS infrastructure this evening through emergency procedures.

More information about the vulnerability can be found on:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350
https://support.microsoft.com/en-us/help/4569509/windows-dns-server-remote-code-execution-vulnerability
https://msrc-blog.microsoft.com/2020/07/14/july-2020-security-update-cve-2020-1350-vulnerability-in-windows-domain-name-system-dns-server/
Posted Jul 15, 2020 - 16:03 CEST
This scheduled maintenance affected: ASPEX Datacenter (Servers / Virtual Machines).