Lucene search

K
f5F5F5:K000139084
HistoryMar 28, 2024 - 12:00 a.m.

K000139084 : DNS vulnerability CVE-2023-50868

2024-03-2800:00:00
my.f5.com
28
dns
vulnerability
denial of service
nsec3
dnssec
rfc 5155
cpu consumption
bind
unbound
remote attacker

7.6 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.2%

Security Advisory Description

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the “NSEC3” issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations. (CVE-2023-50868)

Impact

Unbound

A remote attacker may be able to trigger high CPU consumption using Domain Name System Security Extensions (DNSSEC) responses, causing a denial-of-service (DoS) in validating resolvers. The following BIG-IP configurations are impacted:

  • DNS cache instances set to Validating Resolver
  • DNS resolver instances set to Validating Resolver

BIND

There is no impact; F5 products are not affected by this vulnerability in default, standard, or recommended configurations. However, if the BIND configuration (named.conf) was modified to enable DNS recursion with therecursion yes; line added to the options section of your BIND configuration file, a remote attacker may be able to trigger high CPU consumption using DNSSEC responses, causing a DoS in validating resolvers.