TSIG Authentication Bypass in CoreDNS Affects Multiple Transports
CVE-2026-33190
8.7HIGH
What is CVE-2026-33190?
A vulnerability in CoreDNS allows an unauthenticated remote client to bypass TSIG-based authentication when using non-plain-DNS transports such as DoT, DoH, DoH3, DoQ, and gRPC. This occurs because the tsig plugin improperly trusts the transport writer's TsigStatus() response, which can mistakenly return nil, thereby enabling unauthorized access to restricted resources. The issue has been addressed in version 1.14.3 of CoreDNS.
Affected Version(s)
coredns < 1.14.3
