Home > Threat Directory > DNS Zone Allowing Unsecure Update

DNS Zone Allowing Unsecure Update

Cayosoft Threat Definition CTD-000091

Protect Your Active Directory

Tune into Guardians of the Directory Podcast.

Guardians of the Directory

Like This Article?​

Subscribe to our LinkedIn Newsletter to receive more educational content

Risk Summary

An unsecure dynamic update in a DNS zone allows any device — authenticated or not — to modify DNS records.
This can enable attackers to redirect network traffic, impersonate legitimate services, and harvest credentials.

  • Severity: Critical
  • Platform: Active Directory
  • Category: DNS, Infrastructure
  • MITRE ATT&CK Tactics: Defense Evasion, Credential Access
  • MITRE D3FEND Tactics: Application Configuration Hardening

Description

Microsoft DNS supports dynamic updates, enabling devices to register and update their DNS records automatically.
However, if the zone is configured for Unsecure and Secure updates, no authentication is required for a DNS update request.

This opens several risks:

  • Record Hijacking: Attackers replace an existing host record (e.g., a domain controller or web server) with their own IP address.
  • Credential Theft: Redirecting authentication traffic to a rogue server for password capture.
  • Service Disruption: Overwriting service records to break legitimate application connectivity.

Cayosoft Guardian detects and flags DNS zones where unsecure dynamic updates are allowed.

Cayosoft Guardian Protector™

Real-World Scenario

A DNS zone for corp.local is configured for unsecure dynamic updates.
An attacker connected to the internal network issues a DNS update request, replacing the IP of dc01.corp.local with their own machine’s IP.
When users attempt to log in, authentication requests are sent to the attacker, who captures NTLM hashes.
Cayosoft Guardian would have detected the unsecure update setting and alerted before exploitation.

Stop Privilege Escalation—Then Undo It with Cayosoft Guardian

Real-time alerts across AD & Entra ID with one-click rollback.

How to Detect (Cayosoft Guardian)

1.) Sign in to Cayosoft Guardian Threat Detection Dashboard.

2.) Search for CTD-000091 or DNS zone allowing unsecure update.

3.) Open any alert and Click for details (from Raise Threat Alert action).

Remediation Steps

Using the remediation advice in Cayosoft Guardian, follow these steps to remove the vulnerability:

To disable unsecure dynamic updates:

  1. ) Click Start.
  2. ) Point to Administrative Tools.
  3. ) Click DNS.
  4. ) Under DNS:
    1. ) Double-click the applicable DNS server.
    2. ) Double-click Forward Lookup Zones or Reverse Lookup Zones.
    3. ) Right-click the applicable zone.
  5. ) Click Properties.
  6. ) On the General tab, verify that the zone type is Active Directory-integrated.
  7. ) In the Dynamic updates box, click Secure only or None.
  8. ) Click OK.

How to Prevent It

  • Use Secure Only Updates: Require Active Directory authentication for all dynamic DNS changes.
  • Restrict Permissions: Limit update rights to specific service accounts and trusted devices.
  • Regular Auditing: Periodically check DNS zone properties to verify secure update settings.

FAQ

It’s when a DNS zone accepts record updates from any source, without authentication. This allows any device trusted or untrusted to modify DNS records.

Attackers can hijack critical records (like domain controllers or web servers), redirect authentication traffic, capture credentials, or disrupt business services.

Secure updates require Active Directory authentication and enforce ACL-based permissions. Unsecure updates accept changes from any device on the network, even those not trusted.

References

  • Microsoft – Secure Dynamic Update
  • CISA – Mitigating DNS Infrastructure Attacks

Final Thought

An unsecure DNS update setting is like leaving your company’s map editable by strangers — and attackers will gladly redraw it to lead your users straight into their traps.