CVE-2020-12244 — Improper Verification of Cryptographic Signature in Recursor
Severity
7.5HIGHNVD
EPSS
0.1%
top 73.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 19
Latest updateMay 24
Description
An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages3 packages
Also affects: Debian Linux 10.0, Fedora 31, 32
🔴Vulnerability Details
3📋Vendor Advisories
1Debian▶
CVE-2020-12244: pdns-recursor - An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records i...↗2020
💬Community
3Bugzilla▶
CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [epel-all]↗2020-05-26
Bugzilla▶
CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [fedora-all]↗2020-05-26
Bugzilla▶
CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation↗2020-05-26