A newly discoveredpre-authentication denial-of-service (DoS) vulnerabilityin Microsoft’s Windows Deployment Services (WDS) exposes enterprise networks to instant system crashes via malicious UDP packets. Dubbed a “0-click” flaw, attackers can exploit it remotely without user interaction, draining server memory until critical services fail. While much attention focuses on remote code execution bugs, memory exhaustion vulnerabilities in UDP-based services like […] The post Windows Deployment Services Hit by 0-Click UDP Flaw Leading to System Failures appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
First seen on gbhackers.com
Jump to article: gbhackers.com/windows-deployment-services-hit-by-0-click-udp-flaw/
![]()

