CVE REFERENCE | CRITICAL VULNERABILITY
Active Threat10 min read

CVE-2020-1350: SigRed — The Wormable Windows DNS Server RCE

A 17-year-old heap overflow in the Windows DNS Server that earned a perfect CVSS 10.0 — wormable, pre-authentication, and requiring no user interaction to take over any Windows Server acting as a DNS resolver

10.0
CVSS Score (maximum)
17 years
Bug existed before discovery
Wormable
Self-propagating potential
SYSTEM
Execution privilege level

CVE-2020-1350, named SigRed, is a critical heap overflow vulnerability in the Windows DNS Server service (dns.exe) that was present in every Windows Server release from 2003 to 2019 — a 17-year-old bug discovered by Check Point Research and patched by Microsoft in July 2020. An attacker can send a specially crafted DNS SIG record response to trigger the overflow and achieve SYSTEM-level remote code execution on any Windows Server functioning as a DNS resolver, with no authentication and no user interaction required. It received the maximum CVSS score of 10.0 and was classified as wormable.

Root Cause: SIG Record Parsing Heap Overflow

The Windows DNS Server processes DNS responses containing SIG (signature) resource records as part of DNSSEC operation. The vulnerable code path in dns.exe reads the length field of a SIG record and uses it to allocate a heap buffer. A crafted SIG record with a length value that causes an integer overflow during the allocation calculation results in a heap buffer that is smaller than the data subsequently written into it.

The exploit requires the attacker to either: - Control a malicious DNS server that the target Windows DNS Server forwards queries to (DNS forwarding chain attack), or - Be in a position to send a crafted DNS response over UDP or TCP to the target

Because DNS servers routinely query external resolvers and forward queries to upstream nameservers, the forwarding-chain attack is particularly dangerous — a single compromised or malicious external DNS server can trigger SigRed on any corporate DNS server that forwards to it.

Wormability: Why CVSS 10.0

SigRed received the maximum CVSS score of 10.0 partly due to its wormable classification. A wormable vulnerability can self-propagate across a network without additional attacker interaction:

1. Attacker compromises DNS Server A via SigRed 2. DNS Server A is now weaponized to serve malicious SIG records 3. Any DNS Server B that queries Server A receives the malicious response 4. Server B is compromised 5. The cycle continues across the DNS infrastructure

In an enterprise environment where multiple Windows DNS servers forward to a common external resolver, a single poisoned response could cascade across the entire internal DNS infrastructure. Combined with the SYSTEM execution privilege — which allows complete OS control including credential dumping and lateral movement — the potential blast radius is total domain compromise.

Attack Chain

The SigRed exploitation path targeting a corporate DNS server:

1

Position for DNS Response Injection

Attacker controls a malicious DNS server reachable from the target, or performs DNS response spoofing. The target Windows DNS Server must query the attacker's server — typically via a forwarding configuration or recursive resolution of an attacker-registered domain.

2

Malicious SIG Record Returned

Attacker's DNS server responds to a query with a crafted SIG resource record containing a length field that triggers an integer overflow in dns.exe during heap allocation.

3

Heap Overflow in dns.exe

Windows DNS Server allocates an undersized heap buffer based on the corrupted length value, then writes controlled data beyond the buffer boundary, corrupting adjacent heap structures.

4

SYSTEM Code Execution

Heap corruption leads to controlled code execution within the dns.exe process, which runs as SYSTEM. Attacker achieves full OS control on the DNS server.

5

Domain Compromise and Lateral Propagation

DNS server with SYSTEM privileges enables credential harvesting, Active Directory reconnaissance, and — in the wormable scenario — poisoning of downstream DNS servers querying the now-compromised resolver.

Affected Versions

CVE-2020-1350 affects all Windows Server versions where the DNS Server role is installed:

- Windows Server 2003 (no longer supported, no patch) - Windows Server 2008 / 2008 R2 - Windows Server 2012 / 2012 R2 - Windows Server 2016 - Windows Server 2019

Only systems with the DNS Server role actively running are vulnerable. Domain Controllers frequently run DNS Server by default, making them a primary target — a compromised DC provides immediate domain-wide access.

Detection

Indicators and detection approaches for CVE-2020-1350 exploitation attempts:

Indicators of Compromise
ArtifactTypeSHA-256 (Truncated)
DNS responses containing oversized SIG records (total response > 65,280 bytes)Network — DNS traffic captureFilter DNS traffic for responses exceeding 65KB; the workaround registry key also indirectly detects this by dropping such responses
dns.exe process crash events or unexpected restarts in Windows Event LogWindows Event Log — Application/SystemFailed exploitation attempts may cause dns.exe to crash; Event ID 1000 (Application Error) with faulting module dns.exe
Unexpected child processes spawned by dns.exeProcess telemetry (EDR)dns.exe spawning cmd.exe, powershell.exe, or other shells is a strong post-exploitation indicator; dns.exe should not have interactive child processes
Anomalous outbound DNS-over-TCP connections to external IPsNetwork telemetrySigRed exploit may require TCP DNS (for larger payloads); monitor for DNS Server initiating TCP/53 connections to unexpected external resolvers

Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.

Remediation

Steps in order of priority:

Apply the July 2020 Patch Tuesday update

The fix is in the July 14, 2020 cumulative update (KB4565503 for Windows Server 2019, and corresponding KBs for earlier versions). This is the only complete remediation. Verify via Windows Update history or WSUS compliance reports.

Apply the registry workaround as an emergency measure

Set HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters\TcpReceivePacketSize to 0xFF00 (DWORD). This caps the maximum DNS message size and prevents the oversized SIG record from triggering the overflow. Requires DNS service restart (not a reboot). This workaround was confirmed effective by Microsoft.

Audit DNS forwarding configurations

Review all Windows DNS Server forwarding targets. Remove unnecessary external forwarders. If DNS servers must forward externally, ensure they only forward to known, trusted resolvers (e.g., your ISP's resolvers or a managed service). Eliminate any forwarder pointing to untrusted or unknown IP addresses.

Isolate DNS servers from unnecessary internet exposure

DNS servers should not have their DNS port (UDP/TCP 53) exposed to the internet beyond what is required for authoritative zone serving. Recursive resolvers should be internal-facing only. Restrict DNS server network access using firewall rules to limit which external hosts can send DNS responses to the server.

Prioritize Domain Controllers running DNS Server

Domain Controllers with the DNS Server role installed are the highest-priority targets. A compromised DC via SigRed immediately yields domain admin-equivalent access. Ensure these systems are patched first in any deployment wave.

The bottom line

SigRed is a reminder that some of the most dangerous vulnerabilities are hiding in protocol implementations that have been trusted for decades. A 17-year-old bug in the Windows DNS Server, requiring zero authentication and carrying wormable potential, illustrates why even foundational network services need regular security review. Domain Controllers running DNS Server should be treated as the highest-priority patch targets in any Windows environment — they are simultaneously the most capable and most attractive targets for this class of vulnerability.

Frequently asked questions

What is CVE-2020-1350 (SigRed)?

CVE-2020-1350, named SigRed by Check Point Research, is a wormable heap overflow vulnerability in the Windows DNS Server component (dns.exe) present in all Windows Server versions from 2003 to 2019. It allows unauthenticated remote code execution at SYSTEM level by sending a specially crafted DNS response. It received the maximum CVSS score of 10.0.

Was SigRed ever exploited in the wild?

Microsoft did not report confirmed wild exploitation of CVE-2020-1350. However, the 17-year age of the bug means it could have been known to sophisticated actors before public disclosure. The patch was released the same day as the Check Point research publication.

Is a workaround available if patching is not immediate?

Yes. Microsoft published a registry-based workaround that sets the maximum DNS message length to 0xFF00 (65280 bytes), preventing the oversized SIG record from triggering the overflow. This can be applied without a reboot but is a temporary measure — the July 2020 patch is the definitive fix.

Does SigRed affect DNS clients (workstations)?

No. CVE-2020-1350 is a server-side vulnerability in the Windows DNS Server service. Standard DNS clients and workstations forwarding queries to an affected server are not directly exploitable — but a compromised DNS server can intercept and manipulate all DNS traffic for clients that use it.

Sources & references

  1. Check Point Research — SigRed
  2. Microsoft Security Advisory MS20-085 / CVE-2020-1350
  3. CISA Alert AA20-195A
  4. NVD — CVE-2020-1350
Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.