Microsoft Releases Emergency Windows Server Security Fix

Microsoft has released an emergency patch for all versions of Windows Server after discovering some limited exploitation of a Kerberos vulnerability in the wild.

MS14-068 was withheld from the company’s regular Patch Tuesday updates earlier this month due to some last minute testing requirements, but Microsoft has decided to release the fix out of schedule after deciding it couldn’t wait until next month.

The vulnerability concerns the Windows Kerberos Key Distribution Center (KDC) and allows for the remote elevation of privilege in domains running Windows domain controllers. This means a malicious attacker with the credentials of any domain would be able to grant themselves administrator privileges.

Microsoft security

Microsoft says the exploitations it has witnessed in the wild affect Windows Server 2008 R2 and below, but says it has not seen any targeting Windows Server 2012 and Windows Server 2012 R2, although this is possible.

There are no workarounds and Microsoft says the only mitigating factor is that an attacker would need credentials in the first place, although experts say this is of little consolation.

“Microsoft only release out of band patches for very serious issues and MS14-068 is no exception,” explains Ben Campbell, senior security consultant at MWR InfoSecurity. “With this bug an attacker could take full control of a Windows Domain from the lowest privileged user. A malicious employee, contractor, weak password, or a single successful phishing attack could lead to a full compromise from which an organisation may struggle to recover.

“Microsoft’s own advice is that the only sure way to clean your systems once this level of compromise occurs is with a full domain rebuild, which would have extreme repercussions on any Windows-reliant organisation.

“Some guidance has been released to identify attacks, but Microsoft acknowledges that attackers would be able to hide their presence by improving their exploits to cover their tracks. This raises interesting questions such as how long have advanced attackers been using this technique without detection, and what were the attackers after that convinced them to use such a valuable zero-day attack?”

The update is also available for desktop versions of Windows even though it doesn’t affect them.

This month’s Patch Tuesday was a significant one featuring 16 security bulletins, including one fixing a vulnerability that is 19 years old.

Are you a security expert? Try our quiz!

Steve McCaskill

Steve McCaskill is editor of TechWeekEurope and ChannelBiz. He joined as a reporter in 2011 and covers all areas of IT, with a particular interest in telecommunications, mobile and networking, along with sports technology.

Recent Posts

Northvolt Mulls US Bankruptcy Protection – Report

Troubled battery maker Northvolt reportedly considers Chapter 11 bankruptcy protection in the United States as…

14 hours ago

FTC Plans Investigation Into Microsoft Cloud Business – Report

Microsoft's cloud business practices are reportedly facing a potential anti-competitive investigation by the FTC

16 hours ago

Programmer Sentenced To Five Years In Prison For Bitcoin Laundering

Ilya Lichtenstein sentenced to five years in prison for hacking into a virtual currency exchange…

18 hours ago

Hate Speech Watchdog CCDH To Quit Musk’s X

Target for Elon Musk's lawsuit, hate speech watchdog CCDH, announces its decision to quit X…

1 day ago

Meta Fined €798m Over Alleged Facebook Marketplace Violations

Antitrust penalty. European Commission fines Meta a hefty €798m ($843m) for tying Facebook Marketplace to…

1 day ago

Elon Musk Rebuked By Italian President Over Migration Tweets

Elon Musk continues to provoke the ire of various leaders around the world with his…

2 days ago