ARMORYZE
  • Home
  • Solutions
    • Zero Trust Security
    • Cloud Security
    • Web Application & API Protection
    • SIEM Logging & Monitoring
    • Risk Based Vulnerability Management
  • Services
    • Cyber Essentials & Cyber Essentials Plus Certification
    • IASME Cyber Assurance Certification
    • ISO27001 Certification
    • Penetration Testing
    • Cloud Security Assessment
    • Managed Detection & Response
    • Managed Security Services
    • Managed Compliance Services
  • Company
    • About Us
    • Customer Success Story
    • Free Resources >
      • Whitepaper - How To Prioritize Risk Across the Attack Surface
      • The Ultimate Guide to Achieving Cyber Essentials Plus Certification
      • ISO 27001 Implementation Checklist
      • Whitepaper - What is Credential Stuffing? How To Prevent Credential Stuffing Attacks.
      • eBook: Effective Security Strategies for Devops & Application Services
      • eBook - How To Build A Next Generation SOC
      • Free Cyber Security Assessment & Consultation
    • Free Trial >
      • Armoryze USM Anywhere - Free Trial
    • Careers >
      • Account Manager
      • Business Development Manager
      • Cyber Security Engineer
    • Contact Us
    • Blog
    • Privacy-Policy
  • SHOP
    • Cyber Essentials Certification
    • Cyber Essentials Certification with Expert Assistance
    • Cyber Essentials Plus Certification

Microsoft SQL HIGH RISK REMOTE CODE EXECUTION VULNerability CVE-2019-1068

12/7/2019

0 Comments

 
​Description:
A Remote Code Execution vulnerability (CVE-2019-1068) in Microsoft SQL Server 2014 onwards exists. This vulnerability is ranked as Important, and does require authentication. It is deemed as high risk vulnerability since it could be chained with SQL injection to allow an cyber attacker to completely compromise the server.

Date Discovered: 9 July 2019

Risk Rating: High

Technologies Affected:
  • Microsoft SQL Server 2014 for 32-bit Systems Service Pack 2
  • Microsoft SQL Server 2014 for 32-bit Systems Service Pack 3
  • Microsoft SQL Server 2014 for x64-based Systems Service Pack 2
  • Microsoft SQL Server 2014 for x64-based Systems Service Pack 3
  • Microsoft SQL Server 2016 for x64-based Systems Service Pack 1
  • Microsoft SQL Server 2016 for x64-based Systems Service Pack 2
  • Microsoft SQL Server 2017 for x64-based Systems
Expert Recommendations:

1. Run all software as a non-privileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, always run non-administrative software as an unprivileged user with minimal access rights.

2. Deploy intrusion prevention systems to monitor network traffic for malicious activity.
Deploy IDS/IPS to monitor and block network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits

3. Implement multiple layers of cyber defense.
Memory-protection schemes (such as non-executable stack and heap configurations and randomly mapped memory segments) will complicate exploits of memory-corruption vulnerabilities.

4. Deploy Microsoft updates.
Updates are available from Microsoft. Please refer to vendor website for further information.


0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Book Free - Cyber Security Assessment & Consultation!
    BOOK NOW

      Free - Sign up for email cyber security news & updates!​
    REGISTER ME NOW

    Follow Us and Share on Social Media. Join the Community to fight cyber crime.
    Picture
    Picture
© 2023 Armoryze Consultancy Services, All Rights Reserved
Picture
  • Home
  • Solutions
    • Zero Trust Security
    • Cloud Security
    • Web Application & API Protection
    • SIEM Logging & Monitoring
    • Risk Based Vulnerability Management
  • Services
    • Cyber Essentials & Cyber Essentials Plus Certification
    • IASME Cyber Assurance Certification
    • ISO27001 Certification
    • Penetration Testing
    • Cloud Security Assessment
    • Managed Detection & Response
    • Managed Security Services
    • Managed Compliance Services
  • Company
    • About Us
    • Customer Success Story
    • Free Resources >
      • Whitepaper - How To Prioritize Risk Across the Attack Surface
      • The Ultimate Guide to Achieving Cyber Essentials Plus Certification
      • ISO 27001 Implementation Checklist
      • Whitepaper - What is Credential Stuffing? How To Prevent Credential Stuffing Attacks.
      • eBook: Effective Security Strategies for Devops & Application Services
      • eBook - How To Build A Next Generation SOC
      • Free Cyber Security Assessment & Consultation
    • Free Trial >
      • Armoryze USM Anywhere - Free Trial
    • Careers >
      • Account Manager
      • Business Development Manager
      • Cyber Security Engineer
    • Contact Us
    • Blog
    • Privacy-Policy
  • SHOP
    • Cyber Essentials Certification
    • Cyber Essentials Certification with Expert Assistance
    • Cyber Essentials Plus Certification