CVE-2024-1488
NixOS vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2024-1488) was discovered in Unbound, affecting its default permissions configuration. The vulnerability was disclosed on February 14, 2024, and impacts Unbound's runtime configuration security. The issue affects various versions of Unbound running on Red Hat Enterprise Linux and other Linux distributions (NVD, Red Hat).

Technical details

The vulnerability stems from incorrect default permissions that allow any process outside the unbound group to modify the unbound runtime configuration. The issue occurs when the default combination of 'control-use-cert: no' option is used with either explicit or implicit IP address in the 'control-interface' option. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. The vulnerability has been assigned a CVSS v3.1 base score of 7.3 (HIGH) by NVD and 8.0 (HIGH) by Red Hat (NVD).

Impact

This vulnerability allows an unprivileged local attacker to manipulate a running Unbound instance. The attacker can potentially alter forwarders, track all queries forwarded by the local resolver, and in some cases, completely disrupt DNS resolving functionality. This poses a significant risk to the confidentiality and integrity of DNS operations (Red Hat).

Mitigation and workarounds

To mitigate the vulnerability, a new file '/etc/unbound/conf.d/remote-control.conf' has been added and included in the main unbound configuration file. The file contains two key directives: 'control-interface: "/run/unbound/control"' and 'control-use-cert: "yes"'. Users can verify their configuration using the command 'unbound-control status | grep control'. If the output contains 'control(ssl)' or 'control(namedpipe)', the configuration is not vulnerable. Otherwise, users should add the line 'include: /etc/unbound/conf.d/remote-control.conf' to the end of '/etc/unbound/unbound.conf' (Red Hat).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management