KeyTrap: Denial of Service Vulnerability in DNSSEC
CVE-2023-50387

7.5HIGH

Key Information:

Vendor
DNSSEC
Status
Enterprise Linux
Vendor
CVE Published:
14 February 2024

Badges

๐Ÿ“ˆ Trended๐Ÿ“ˆ Score: 4,490๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC๐Ÿ“ฐ News Worthy

What is CVE-2023-50387?

CVE-2023-50387 is a critical vulnerability affecting the DNSSEC protocol, a vital component of the Domain Name System (DNS) used to enhance its security. This vulnerability, referred to as the "KeyTrap" issue, allows remote attackers to exploit certain aspects of DNSSEC to induce a denial of service (DoS). The significance of this flaw lies in its potential to increase CPU consumption on affected systems, disrupting crucial DNS resolution processes for organizations that depend on reliable web connectivity and domain resolution.

Technical Details

The vulnerability stems from how DNSSEC handles responses involving multiple DNSKEY and RRSIG records as specified in several RFCs (4033, 4034, 4035, 6840, and related). When a DNS zone contains numerous DNSKEY and RRSIG records, the protocol requires an evaluation of their various combinations. This process can lead to excessive CPU resource consumption, effectively crippling DNS resolution services. Attackers can leverage this flaw by sending specially crafted DNSSEC responses, making it feasible to launch targeted DoS attacks against an organizationโ€™s DNS infrastructure.

Impact of the Vulnerability

  1. Denial of Service: The primary impact of CVE-2023-50387 is the potential for a significant denial of service. Organizations may experience prolonged outages in their DNS services, leading to inaccessibility of web resources and applications that rely on domain name resolution, severely affecting business operations.

  2. Operational Disruption: Due to the nature of the attack, if exploited successfully, it may incapacitate large sections of the internet connected to vulnerable DNS servers, leading to widespread operational disruptions in various sectors reliant on those systems, potentially affecting users globally.

  3. Resource Strain: Organizations could face increased operational costs since the exploited servers would be subjected to heightened resource strain, necessitating upgrades or additional hardware to manage the unreasonable CPU load generated by such attacks, all while risking reputational damage and customer trust.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Microsoft Late to the Game on Dangerous DNSSEC Zero-Day Flaw

Why the company took so long to address the issue is not known given that most other stakeholders had a fix out for the issue months ago.

7 months ago

New DNSSEC Vulnerability CVE-2023-50387: Threatening System Stability and Security

The recently discovered CVE-2023-50387 targets DNSSEC validator KeyTrap, leading to extreme CPU consumption and threatening system stability. Learn about its implications and the path forward in securing affected systems.

10 months ago

KeyTrap attack can take out a DNS server

The KeyTrap attack can disable DNS servers by sending a single malicious packet that exploits a vulnerability in DNSSEC (CVE-2023-50387).

11 months ago

References

EPSS Score

6% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐Ÿ“ฐ

    First article discovered by BNN Breaking

  • ๐Ÿ“ˆ

    Vulnerability started trending

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre DatabaseDNSSEC Feed1 Proof of Concept(s)4 News Article(s)
.