Lucene search

K
f5F5F5:K000139092
HistoryMar 29, 2024 - 12:00 a.m.

K000139092 : DNS vulnerability CVE-2023-50387

2024-03-2900:00:00
my.f5.com
31
dns vulnerability
dnssec
denial of service
cpu consumption
cve-2023-50387

7.7 High

AI Score

Confidence

High

0.05 Low

EPSS

Percentile

92.9%

Security Advisory Description

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the “KeyTrap” issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records. (CVE-2023-50387)

Impact

Unbound

A remote attacker may be able to trigger high CPU consumption using Domain Name System Security Extensions (DNSSEC) responses, causing a denial-of-service (DoS) in validating resolvers. The following BIG-IP configurations are impacted:

  • DNS cache instances set to Validating Resolver
  • DNS resolver instances set to Validating Resolver

BIND

There is no impact; F5 products are not affected by this vulnerability in default, standard, or recommended configurations. However, if the BIND configuration (named.conf) was modified to enable DNS recursion with therecursion yes; line added to the options section of your BIND configuration file, a remote attacker may be able to trigger high CPU consumption using DNSSEC responses, causing a DoS in validating resolvers.