News

CVE-2020-16898

During October 2020 Microsoft’s patch, an security update have addressed a critical vulnerabilities that been resides within the Windows TCP/IP stack which called DNS RA options or also known as IPv6 Router Advertisement Options.

The vulnerability exploitation will cause a Denial of Service (DoS) that might bring a possible attack of remote code execution. The vulnerability has effects multiple Windows versions that been supporting RDNSS IPv6 including Windows 10 version 1709.

Recommendation or workaround for the fix

The recommendation for the vulnerabilities is to disable IPv6 RDNSS which i will show on the step of disabling it.

Step 1

Firstly, open the command line (cmd) in windows operating system.

Step 2

Once the user command line and type the following

netsh int ipv6 set int *INTERFACENUMBER* rabaseddnsconfig=disable

Step 3

You need to verify that it is successfully disable completely which the command to check would be something like follows:

netsh int ipv6 sh int Idx number

Reminder: No need to reboot after disable the IPv6

Source: CVE-2020-16898 | Windows TCP/IP Remote Code Execution Vulnerability

Leave a Reply

Your email address will not be published. Required fields are marked *