Vulnerability Details CVE-2023-2829
A `named` instance configured to run as a DNSSEC-validating recursive resolver with the Aggressive Use of DNSSEC-Validated Cache (RFC 8198) option (`synth-from-dnssec`) enabled can be remotely terminated using a zone with a malformed NSEC record.
This issue affects BIND 9 versions 9.16.8-S1 through 9.16.41-S1 and 9.18.11-S1 through 9.18.15-S1.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 20.7%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2023-2829
-
cpe:2.3:a:isc:bind:9.16.11
-
cpe:2.3:a:isc:bind:9.16.12
-
cpe:2.3:a:isc:bind:9.16.13
-
cpe:2.3:a:isc:bind:9.16.14
-
cpe:2.3:a:isc:bind:9.16.21
-
cpe:2.3:a:isc:bind:9.16.32
-
cpe:2.3:a:isc:bind:9.16.36
-
cpe:2.3:a:isc:bind:9.16.8
-
cpe:2.3:a:isc:bind:9.18.11
-
cpe:2.3:a:netapp:active_iq_unified_manager:-
-
-
-
-
-
-
cpe:2.3:o:netapp:h300s_firmware:-
-
cpe:2.3:o:netapp:h410c_firmware:-
-
cpe:2.3:o:netapp:h410s_firmware:-
-
cpe:2.3:o:netapp:h500s_firmware:-
-
cpe:2.3:o:netapp:h700s_firmware:-