
Cloud Vulnerability DB
A community-led vulnerabilities database
A security vulnerability was identified in CoreDNS versions prior to 1.6.6, tracked as GHSA-gv9j-4w24-q7vx. The vulnerability stems from improper random number generation in the DNS package, where the system inappropriately utilized math/rand for generating transaction IDs. This vulnerability was discovered and publicly disclosed, affecting the github.com/coredns/coredns package (GitHub Advisory).
The vulnerability is classified with moderate severity and is related to CWE-330 (Use of Insufficiently Random Values). The core issue lies in the implementation of random number generation where the DNS package (versions < 1.1.25) utilized math/rand, resulting in predictable Transaction IDs (TXID) (GitHub Advisory).
The primary impact of this vulnerability is that the predictable nature of the Transaction IDs (TXID) could lead to response forgeries. This predictability compromises the security of DNS transactions and potentially allows attackers to forge DNS responses (GitHub Advisory).
The vulnerability has been patched in CoreDNS version 1.6.6 and later releases. Users are advised to upgrade to version 1.6.6 or newer to address this security issue (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."