Amplification Attack Vulnerability in PowerDNS Recursor by PowerDNS
CVE-2020-10995

7.5HIGH

Key Information:

Vendor
Powerdns
Status
Vendor
CVE Published:
19 May 2020

Summary

PowerDNS Recursor versions 4.1.0 to 4.3.0 are susceptible to amplification attacks due to inadequate defenses against the DNS protocol vulnerabilities. Attackers can exploit these recursive DNS services to redirect traffic to third-party authoritative name servers, significantly amplifying the volume of the attack and degrading the performance of both recursive and authoritative services. Random subdomains can trigger the issue in NS records, increasing the potential for service disruption. Mitigations have been implemented in versions 4.1.16, 4.2.2, and 4.3.1 to address the impact of this vulnerability.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.