You’ve heard it before — from us and from, well, pretty much everyone who values security. Patch your systems. If you don’t, you are not secure. It’s as simple as that.
As if we needed more reminding of this global truism, Microsoft just released a new patch for a critical vulnerability in their DNS service. To an average Joe, if they even know what DNS is, this is an entirely unimpressive patch. But to those in the know, this is huge!
This is a remote code execution vulnerability. The attacker can execute whatever they want on the affected system – as the Local System account. Need I remind you that when you run Microsoft Active Directory, DNS is generally installed by default on the domain controllers? Yikes!
Slightly Less Nerdy Version:
The DNS service, which is running on most Active Directory servers, where your corporate identity and all permission groups are stored, has a vulnerability in it that will let the bad guys do whatever they want on your domain once they get inside the network.
For Everyone Else:
Hackers can get onto servers that will let them get to companies’ information and do whatever the heck they want.
I don’t think I need to tell everyone that this is a big one.
TL;DR: Patch your servers. Especially your domain controllers. Sooner rather than later.