The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
2024-02-14T16:15:45.377
2025-12-23T20:20:08.930
Analyzed
CVSSv3.1: 7.5 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | isc | bind | < 9.16.48 | Yes |
| Application | isc | bind | < 9.16.48 | Yes |
| Application | isc | bind | < 9.18.24 | Yes |
| Application | isc | bind | < 9.18.24 | Yes |
| Application | isc | bind | < 9.19.21 | Yes |
| Operating System | fedoraproject | fedora | 38 | Yes |
| Operating System | fedoraproject | fedora | 39 | Yes |
| Operating System | debian | debian_linux | 10.0 | Yes |
| Operating System | debian | debian_linux | 11.0 | Yes |
| Operating System | redhat | enterprise_linux | 6.0 | Yes |
| Operating System | redhat | enterprise_linux | 7.0 | Yes |
| Operating System | redhat | enterprise_linux | 8.0 | Yes |
| Operating System | redhat | enterprise_linux | 8.2 | Yes |
| Operating System | redhat | enterprise_linux | 8.4 | Yes |
| Application | powerdns | recursor | < 4.8.5 | Yes |
| Application | powerdns | recursor | < 4.9.3 | Yes |
| Application | powerdns | recursor | < 5.0.2 | Yes |
| Operating System | netapp | bootstrap_os | - | Yes |
| Hardware | netapp | hci_compute_node | - | No |
| Application | netapp | active_iq_unified_manager | - | Yes |
| Application | netapp | hci_baseboard_management_controller | - | Yes |
| Hardware | netapp | h300s | - | No |
| Hardware | netapp | h410c | - | No |
| Hardware | netapp | h410s | - | No |
| Hardware | netapp | h500s | - | No |
| Hardware | netapp | h700s | - | No |