
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the bailiwick checking function in Technitium DNS Server <= v7.0 allows specific malicious users to inject NS records of any domain (even TLDs) into the cache and conduct a DNS cache poisoning attack (NVD).
The vulnerability has been assigned a CVSS v3.1 Base Score of 4.3 MEDIUM (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) and CVSS v2.0 Base Score of 4.0 MEDIUM (Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N). The vulnerability specifically affects the bailiwick checking mechanism, which is meant to validate and restrict NS record injections (NVD).
The vulnerability enables attackers to perform DNS cache poisoning attacks by injecting unauthorized NS records for any domain, including top-level domains (TLDs). This can lead to the redirection of DNS queries to malicious servers, potentially affecting the integrity of DNS resolution for all users of the affected DNS server (NVD, BleepingComputer).
The vulnerability has been patched in versions after 7.0. Users are advised to upgrade their Technitium DNS Server installations to the latest version to mitigate this security risk (Technitium Changelog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."