
Cloud Vulnerability DB
A community-led vulnerabilities database
CoreDNS through version 1.10.1 contains a vulnerability that enables attackers to perform DNS cache poisoning attacks and inject fake responses through a birthday attack technique. This vulnerability was discovered by Xiang Li from NISL Lab of Tsinghua University (GitHub Gist).
The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N. It has been classified under CWE-290 (Authentication Bypass by Spoofing). The vulnerability allows attackers to send queries to CoreDNS and inject fake DNS responses to poison the CoreDNS server (CISA-ADP).
The primary impact of this vulnerability is the potential for DNS cache poisoning, which could allow attackers to redirect users to malicious websites or intercept network traffic. This could lead to significant security implications for systems relying on CoreDNS for DNS resolution (GitHub Gist).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."