In Microsoft’s October 2020 Patch-Tuesday release, a remote code execution vulnerability CVE-2020-16898 was disclosed. The vulnerability is wormable and does not require any user interaction. The proof-of-concept code for crashing the victim system is available publicly and the vulnerability could soon be weaponized by malicious actors. The CloudPassage Halo cloud security platform identifies which servers are vulnerable. Below are instructions as to how to find the Microsoft TCP/IP Vulnerability and fix it.
The vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets and an attacker who successfully exploits this vulnerability could gain the ability to execute code on the target server or client.
To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer. The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets.
The first step in managing risk from this vulnerability is to identify all assets in your environment. In ServerSecure, this simply requires a search for CVE-2020-16898:
The Package Health view displays the status of all of the software packages on the server at the time of the most recent scan. If you want to view results from a different scan, click the Data as of drop-down to select a different date. By default, the data in the list is sorted by criticality.
The graphic summary displays the following information:
If the server you are viewing has a Windows operating system, then a KBs Installed subtab displays in the Server Details > Software view. Here, you can see the KBs that are installed on the selected server by install date. In the screen capture, you can observe that KB4577668 is not installed.
We recommend installing the patch immediately to any vulnerable systems. If that is not possible, the next best option is to follow the Microsoft workaround to disable ICMPv6 RDNSS.
You can disable ICMPv6 RDNSS, to prevent attackers from exploiting the vulnerability, with the PowerShell command:
netsh int ipv6 set int *INTERFACENUMBER* rabaseddnsconfig=disable
This workaround is only available for Windows 1709 and above. See What’s new in Windows Server 1709 for more information.
You can disable the workaround with the PowerShell command:
netsh int ipv6 set int *INTERFACENUMBER* rabaseddnsconfig=enable
Note: No reboot is needed after making the change.
The Windows TCP/IP vulnerability CVE-2020-16898 has PoC exploit code available for denial of service. The vulnerability could be soon weaponized by malicious actors. Organizations should consider immediately identifying vulnerable assets and proceed with patching or workarounds.
Learn more about CloudPassage Halo Server Secure.
Get a free vulnerability assessment of your infrastructure in 30 minutes.