#VU7550 Authentication bypass in Knot DNS - CVE-2017-11104
Published: July 15, 2017 / Updated: August 24, 2017
Vulnerability identifier: #VU7550
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2017-11104
CWE-ID: CWE-287
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
Knot DNS
Knot DNS
Software vendor:
Nic
Nic
Description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to a flaw in the TSIG protocol implementation. A remote attacker can use a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set.
The weakness exists due to a flaw in the TSIG protocol implementation. A remote attacker can use a valid key name and algorithm to bypass TSIG authentication if no additional ACL restrictions are set.
Remediation
The vulnerability is addressed in the following versions: 2.4.5 and 2.5.2.