
Cloud Vulnerability DB
A community-led vulnerabilities database
Windows DNS Server Remote Code Execution Vulnerability (CVE-2022-21984) was disclosed in February 2022. The vulnerability affects Microsoft DNS server configurations where dynamic updates are enabled. This security flaw could potentially allow remote code execution with elevated privileges on affected systems (Threatpost).
The vulnerability specifically impacts Microsoft DNS server installations with dynamic updates enabled, though this is not the default configuration. The severity of this vulnerability is rated as HIGH with a CVSS v3.1 base score of 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). If exploited, an attacker could execute code with elevated privileges on the DNS server (NVD).
If successfully exploited, this vulnerability could allow an attacker to completely take over the DNS server and execute code with elevated privileges. The impact is particularly severe for organizations using DNS servers with dynamic updates enabled, as it could lead to full system compromise (Threatpost).
Microsoft has released security updates to address this vulnerability. Organizations running affected DNS servers should apply the February 2022 security updates. For systems where immediate patching is not possible, ensuring that dynamic updates are disabled can serve as a temporary mitigation measure (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."