Insufficient Verification of Data Authenticity (CWE-345)
Windows DNS Spoofing Vulnerability. This is a vulnerability in Windows DNS that allows for DNS spoofing attacks. It has a CVSS v3.1 base score of 7.5, indicating a high severity. The vulnerability is characterized by low attack complexity, no privileges required, and no user interaction needed. It can be exploited over the network and impacts confidentiality, but not integrity or availability.
This vulnerability could allow an attacker to perform DNS spoofing attacks, potentially redirecting network traffic to malicious sites. The high confidentiality impact suggests that sensitive information could be exposed. Given the nature of DNS, this could affect a wide range of services and applications that rely on DNS for name resolution. It could lead to data theft, phishing attacks, or serve as a stepping stone for further network compromise.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
Patches are available. Microsoft released updates to address this vulnerability on August 13, 2024. The vulnerability affects multiple versions of Windows Server, including Windows Server 2008, 2012, 2016, 2019, 2022, and 2022 23H2. Specific version numbers that need patching include: - Windows Server 2008 R2 SP1 and SP2 - Windows Server 2022 23H2 versions prior to 10.0.25398.1085 - Windows Server 2016 versions prior to 10.0.14393.7259 - Windows Server 2012 and 2012 R2 - Windows Server 2022 versions prior to 10.0.20348.2655 - Windows Server 2019 versions prior to 10.0.17763.6189
1. Apply the security updates provided by Microsoft as soon as possible, prioritizing internet-facing systems. 2. If immediate patching is not possible, consider implementing network segmentation to limit the potential impact of DNS spoofing attacks. 3. Monitor DNS traffic for unusual patterns or unexpected redirections. 4. Implement DNSSEC (Domain Name System Security Extensions) where possible to add an additional layer of authentication to DNS queries. 5. Educate users about the risks of phishing and the importance of verifying website authenticity. 6. Consider using alternative DNS providers or services that offer additional security features as a temporary measure until patching is complete.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
Detection for the vulnerability has been added to Qualys (92160)
A CVSS base score of 7.5 has been assigned.
Feedly found the first article mentioning CVE-2024-37968. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-37968
Feedly estimated the CVSS score as MEDIUM
EPSS Score was set to: 0.2% (Percentile: 58.6%)