burnley
Regular Pleskian
Received last night an email from Plesk with the following content:
Microsoft Windows Server Critical Vulnerability
There's a critical vulnerability in Microsoft Windows Server's default configuration. If your server is compromised, this can be used to obtain Administrator privileges.
Even though this vulnerability isn't in Plesk, we're invested in your server's safety. And so, as a temporary workaround, we recommend you disable DCOM support on the server. Alternatively, Microsoft official recommendations state that using Windows Server 2019 would mitigate this attack vector.
You can find full details and our recommendation on this issue in our dedicated Plesk Knowledge Base article below.
If you run into any issues with Plesk in this context, please contact our support team and use "PFSI-61569" to ensure we handle your request efficiently.
Stay safe,
The Plesk Security Team
Didn't look like phishing to me Can you please quote the original advisory for this DCOM vulnerability?
Microsoft Windows Server Critical Vulnerability
There's a critical vulnerability in Microsoft Windows Server's default configuration. If your server is compromised, this can be used to obtain Administrator privileges.
Even though this vulnerability isn't in Plesk, we're invested in your server's safety. And so, as a temporary workaround, we recommend you disable DCOM support on the server. Alternatively, Microsoft official recommendations state that using Windows Server 2019 would mitigate this attack vector.
You can find full details and our recommendation on this issue in our dedicated Plesk Knowledge Base article below.
If you run into any issues with Plesk in this context, please contact our support team and use "PFSI-61569" to ensure we handle your request efficiently.
Stay safe,
The Plesk Security Team
Didn't look like phishing to me Can you please quote the original advisory for this DCOM vulnerability?