<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dns — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/dns/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 17:31:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/dns/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Kerberos SPN Spoofing via Suspicious DNS Query</title><link>https://feed.craftedsignal.io/briefs/2024-10-kerberos-spn-spoofing-dns/</link><pubDate>Fri, 01 May 2026 17:31:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-kerberos-spn-spoofing-dns/</guid><description>Detects suspicious DNS queries containing a base64-encoded blob, indicating potential Kerberos coercion attacks and SPN spoofing via DNS to coerce authentication to attacker-controlled hosts, enabling Kerberos or NTLM relay attacks.</description><content:encoded><![CDATA[<p>This detection identifies a specific pattern in DNS queries indicative of Kerberos SPN spoofing, a technique used to coerce systems into authenticating to attacker-controlled hosts. The pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo; represents a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers exploit this by crafting malicious DNS names to trick victim systems into requesting Kerberos tickets for legitimate services, often their own identity, but directed towards an attacker-controlled endpoint. This can lead to Kerberos relay or NTLM reflection/relay attacks, bypassing normal NTLM fallback mechanisms. The technique is associated with tools like RemoteKrbRelay and wspcoerce. This activity has been observed in various attacks targeting Windows environments where Kerberos authentication is prevalent. Defenders need to detect and mitigate this early stage of credential access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target Windows system within the network.</li>
<li>The attacker sets up a malicious server to receive coerced authentication requests.</li>
<li>The attacker crafts a malicious DNS query containing a base64-encoded blob &ldquo;UWhRCA&hellip;BAAAA&rdquo; representing a marshaled CREDENTIAL_TARGET_INFORMATION structure.</li>
<li>The victim system, triggered by an external factor (e.g., RPC call, scheduled task, or web request), attempts to resolve the crafted DNS name.</li>
<li>The malicious DNS query is sent to the DNS server, which resolves to the attacker&rsquo;s server.</li>
<li>The victim system initiates a Kerberos authentication request to the attacker&rsquo;s server, believing it to be a legitimate service.</li>
<li>The attacker&rsquo;s server relays the Kerberos ticket or uses NTLM reflection/relay techniques to gain unauthorized access.</li>
<li>The attacker compromises the victim system or pivots to other systems within the network using the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to credential compromise, lateral movement, and domain takeover. Victims in Active Directory environments are particularly vulnerable. The impact includes unauthorized access to sensitive data, disruption of services, and potential ransomware deployment. If the coerced service has high privileges, the attacker can gain complete control over the compromised system or even the entire domain. Organizations using Kerberos authentication are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Potential Kerberos SPN Spoofing via Suspicious DNS Query&rdquo; rule to your SIEM and tune for your environment to detect malicious DNS queries.</li>
<li>Enable Sysmon Event ID 22 - DNS Query logging to provide the necessary data for detection.</li>
<li>Investigate and block any DNS queries resolving to external IPs that contain the &ldquo;UWhRCA&hellip;BAAAA&rdquo; pattern.</li>
<li>Monitor process creation events for processes initiating DNS queries containing the suspicious pattern, specifically looking for known coercion tools.</li>
<li>Implement network segmentation to limit the impact of lateral movement if a system is compromised.</li>
<li>Review and harden Kerberos configurations to prevent SPN spoofing and relay attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>kerberos</category><category>spn-spoofing</category><category>dns</category><category>windows</category></item><item><title>Hickory DNS Recursor Cache Poisoning via Sibling Zone Delegation</title><link>https://feed.craftedsignal.io/briefs/2024-11-hickory-dns-poisoning/</link><pubDate>Thu, 30 Apr 2026 18:10:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-hickory-dns-poisoning/</guid><description>The experimental `hickory-recursor` crate in Hickory DNS is vulnerable to cross-zone cache poisoning due to storing DNS records keyed by record name/type instead of query, enabling an attacker to redirect queries for a victim zone to an attacker-controlled nameserver.</description><content:encoded><![CDATA[<p>The Hickory DNS project&rsquo;s experimental <code>hickory-recursor</code> crate, now integrated into <code>hickory-resolver</code> under the <code>recursor</code> feature, contains a vulnerability in its DNS record cache (<code>DnsLru</code>). The cache stores records based on the record&rsquo;s name and type, rather than the originating query. This design flaw allows for cross-zone cache poisoning because the <code>cache_response()</code> function chains <code>ANSWER</code>, <code>AUTHORITY</code>, and <code>ADDITIONAL</code> sections into a single record iterator during insertion. The bailiwick filter uses the zone context of the NS pool that serviced the lookup, leading to improper validation of records from sibling zones. This issue affects all published versions of the experimental <code>hickory-recursor</code> crate prior to its integration into <code>hickory-resolver</code> 0.26.0. Users of the <code>hickory-dns</code> binary configured with the <code>recursor</code> feature are affected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker registers the domain <code>attacker.poc.</code> and sets up a malicious nameserver.</li>
<li>Hickory DNS server queries the nameserver for <code>attacker.poc.</code> to build its NS pool.</li>
<li>The attacker&rsquo;s nameserver responds with an <code>AUTHORITY</code> section that includes a malicious record delegating a sibling zone, such as <code>victim.poc.</code>, to <code>ns.evil.poc.</code>.</li>
<li>The Hickory DNS server&rsquo;s bailiwick check incorrectly validates the malicious <code>victim.poc. NS ns.evil.poc.</code> record because <code>victim.poc.</code> is a subdomain of the parent zone <code>poc.</code>.</li>
<li>The malicious NS record for <code>victim.poc.</code> is stored in the cache, keyed by <code>(victim.poc., NS)</code>.</li>
<li>A client queries the Hickory DNS server for a name within the <code>victim.poc.</code> zone.</li>
<li>Hickory DNS server builds its NS pool for <code>victim.poc.</code> using the poisoned cache entry, directing queries to <code>ns.evil.poc.</code>.</li>
<li>The attacker&rsquo;s nameserver now receives queries intended for the legitimate <code>victim.poc.</code> nameserver, allowing the attacker to intercept and manipulate DNS resolution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to redirect DNS queries for a target domain to an attacker-controlled nameserver. This can lead to various malicious activities, including phishing attacks, man-in-the-middle attacks, and the distribution of malware. The vulnerability affects any system using Hickory DNS with the <code>recursor</code> feature enabled, potentially impacting a wide range of users relying on the resolver for DNS resolution. If the targeted domain is critical for service delivery (e.g., email, web), the impact could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>hickory-resolver</code> version 0.26.0 or later with the <code>recursor</code> feature enabled to address the vulnerability as described in the advisory (<a href="https://github.com/advisories/GHSA-83hf-93m4-rgwq">https://github.com/advisories/GHSA-83hf-93m4-rgwq</a>).</li>
<li>If upgrading is not immediately feasible, disable the <code>recursor</code> feature in <code>hickory-dns</code> to prevent exploitation.</li>
<li>Implement monitoring for unexpected NS record changes, focusing on <code>AUTHORITY</code> sections of DNS responses, using a custom rule based on your environment and typical DNS configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dns</category><category>cache-poisoning</category><category>zone-delegation</category></item><item><title>Internet Systems Consortium BIND Vulnerabilities Leading to Denial of Service</title><link>https://feed.craftedsignal.io/briefs/2026-03-isc-bind-dos/</link><pubDate>Mon, 30 Mar 2026 10:14:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-isc-bind-dos/</guid><description>Multiple vulnerabilities in Internet Systems Consortium BIND can be exploited by a remote attacker to conduct a denial of service attack or bypass security measures.</description><content:encoded><![CDATA[<p>The Internet Systems Consortium (ISC) BIND (Berkeley Internet Name Domain) is a widely used open-source DNS server software. Multiple vulnerabilities exist within BIND that can be exploited by remote attackers. An unauthenticated attacker can leverage these flaws to conduct denial-of-service (DoS) attacks, disrupting DNS resolution services. The specific versions affected are not specified in the provided source, but administrators should consult ISC&rsquo;s security advisories for detailed version information. Exploitation of these vulnerabilities can severely impact the availability of services that rely on DNS resolution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable BIND DNS server exposed to the internet.</li>
<li>The attacker sends specially crafted DNS queries to the target server. These queries exploit known vulnerabilities within the BIND software.</li>
<li>The BIND server, upon processing the malicious queries, experiences a resource exhaustion issue.</li>
<li>The excessive resource consumption leads to the BIND process becoming unresponsive.</li>
<li>Legitimate DNS requests are no longer processed, resulting in a denial of service for clients relying on the BIND server for name resolution.</li>
<li>The attacker repeats the process to maintain the denial of service condition.</li>
<li>The impact is widespread as applications and services reliant on DNS name resolution become unavailable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these BIND vulnerabilities can lead to a denial-of-service condition, disrupting DNS resolution services. This impacts all services reliant on the affected BIND server, potentially affecting thousands of users and systems. The lack of DNS resolution can lead to widespread application failures, service unavailability, and reputational damage. The absence of specific victim counts prevents a definitive assessment of impact scope.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor DNS server logs for anomalies indicative of denial-of-service attacks, focusing on query rates and resource utilization.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to identify potentially malicious DNS queries targeting BIND servers.</li>
<li>Consult ISC&rsquo;s security advisories for specific vulnerability details and apply the necessary patches to your BIND installations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dns</category><category>denial-of-service</category><category>bind</category></item><item><title>Potential Kerberos Coercion via DNS-Based SPN Spoofing</title><link>https://feed.craftedsignal.io/briefs/2024-01-kerberos-coercion-dns/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kerberos-coercion-dns/</guid><description>Adversaries may abuse MicrosoftDNS records containing a base64-encoded blob to coerce victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services, detected via directory-service access events.</description><content:encoded><![CDATA[<p>This detection identifies potential Kerberos coercion attempts via DNS-based SPN spoofing on Windows systems. The technique abuses MicrosoftDNS records, specifically looking for directory-service access or creation events (event codes 4662 and 5137) involving a MicrosoftDNS record that contains a base64-encoded blob matching the pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo;. This blob pattern corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure, a known indicator of DNS-based SPN spoofing used in Kerberos coercion tradecraft. The goal is to detect adversaries coercing victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services. This activity is typically observed within Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The adversary gains initial access to a system with privileges to modify DNS records in Active Directory.</li>
<li>The attacker creates a new MicrosoftDNS record or modifies an existing one.</li>
<li>Within the DNS record, specifically in the <code>AdditionalInfo</code> or <code>ObjectDN</code> attributes, the attacker inserts a base64-encoded blob matching the pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo;. This blob contains a marshaled CREDENTIAL_TARGET_INFORMATION structure.</li>
<li>The attacker configures the DNS record to point to an attacker-controlled host. This involves manipulating the record&rsquo;s name and associated IP address.</li>
<li>The attacker triggers a victim system to resolve the manipulated DNS record, causing the victim to attempt Kerberos authentication with the attacker-controlled host, believing it to be a legitimate service.</li>
<li>The attacker intercepts the Kerberos authentication request.</li>
<li>The attacker relays the Kerberos ticket to a legitimate service, impersonating the victim system.</li>
<li>The attacker gains unauthorized access to the legitimate service using the relayed Kerberos ticket.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Kerberos coercion can grant attackers unauthorized access to critical systems and services within the Active Directory domain. This may lead to privilege escalation, lateral movement, data exfiltration, and other malicious activities. The scope of impact depends on the permissions and access rights of the coerced victim system and the targeted services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Access&rdquo; and &ldquo;Audit Directory Service Changes&rdquo; Windows audit policies to ensure relevant events are logged (Setup section).</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential Kerberos coercion attempts via DNS-based SPN spoofing. Tune the rules based on your environment and known legitimate activity.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on the associated user accounts, systems, and modified DNS records (rule titles).</li>
<li>Restrict access to modify DNS records in Active Directory to only authorized personnel and systems to prevent unauthorized manipulation (Overview section).</li>
<li>Monitor Windows Security authentication events for any suspicious Kerberos activity following the modification of DNS records (Attack Chain steps 5-8).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kerberos</category><category>coercion</category><category>dns</category><category>spn</category><category>spoofing</category><category>credential-access</category></item><item><title>RMM Domain DNS Queries from Non-Browser Processes</title><link>https://feed.craftedsignal.io/briefs/2024-01-rmm-domain-dns/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rmm-domain-dns/</guid><description>Detects DNS queries to commonly abused remote monitoring and management (RMM) or remote access software domains from non-browser processes, potentially indicating unauthorized remote access or command and control activity.</description><content:encoded><![CDATA[<p>This detection identifies potentially malicious use of Remote Monitoring and Management (RMM) tools by detecting DNS queries to known RMM domains originating from processes that are not web browsers. Attackers frequently abuse legitimate RMM software for command and control, persistence, and lateral movement within compromised networks. This rule focuses on surfacing RMM clients, scripts, or other non-browser activity contacting these services, thereby increasing the likelihood of detecting unauthorized remote access or malicious activity. The rule aims to reduce false positives by excluding common browser processes and focusing on unusual network activity. The identified domains are associated with various RMM tools like TeamViewer, AnyDesk, and ScreenConnect. This detection is relevant for organizations concerned about insider threats, supply chain attacks, or general compromise leading to unauthorized remote access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker installs an unauthorized RMM tool (e.g., using a script or installer).</li>
<li>The RMM tool initiates a DNS query to resolve its command and control domain (e.g., teamviewer.com).</li>
<li>The system, now running the RMM agent, establishes a connection to the attacker-controlled RMM server.</li>
<li>The attacker uses the RMM tool to execute commands on the compromised system.</li>
<li>The attacker uses the RMM tool for lateral movement within the network.</li>
<li>The attacker uses the RMM tool to maintain persistence on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise via unauthorized RMM tools can provide attackers with persistent remote access, enabling them to perform a range of malicious activities, including data theft, ransomware deployment, and further lateral movement within the network. Successful exploitation can lead to significant financial loss, reputational damage, and disruption of business operations. The number of affected systems can vary depending on the scope of the initial compromise and the attacker&rsquo;s ability to move laterally.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>RMM Domain DNS Queries from Non-Browser Processes</code> to your SIEM and tune it to your environment, excluding legitimate non-browser processes that use RMM tools.</li>
<li>Investigate any alerts generated by the rule, focusing on identifying the process making the DNS query and its parent process, as outlined in the rule&rsquo;s description.</li>
<li>Monitor DNS query logs for queries to the RMM domains listed in the IOC table, and block them at the DNS resolver if unauthorized RMM use is confirmed.</li>
<li>Enable Sysmon Event ID 22 (DNS Query) logging to provide the necessary data for this detection, as recommended in the &ldquo;Setup&rdquo; section of the content.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>rmm</category><category>dns</category></item><item><title>Suspicious DNS Queries to Telegram API by Non-Telegram Processes</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-telegram-dns-query/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-telegram-dns-query/</guid><description>Detection of a process making DNS queries to the Telegram API domain, which is indicative of malware utilizing Telegram bots for command and control (C2) communications.</description><content:encoded><![CDATA[<p>This alert identifies systems querying the Telegram API domain (api.telegram.org) using processes other than the legitimate Telegram application. Threat actors frequently leverage Telegram bots for C2, due to their ease of use, encryption, and widespread availability. Malware can use these bots to receive commands, exfiltrate data, or perform other malicious activities. Detecting DNS queries for Telegram&rsquo;s API from unexpected processes can uncover compromised systems or unauthorized use of Telegram for covert communication. The detection focuses on non-standard Telegram clients resolving the api.telegram.org domain to filter out legitimate Telegram application traffic and focus on suspicious processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user inadvertently downloads and executes a malicious payload (e.g., via phishing or drive-by download).</li>
<li>The malware establishes persistence on the system (e.g., via registry keys or scheduled tasks).</li>
<li>The malware initiates a DNS query to resolve api.telegram.org to identify the Telegram API server IP address.</li>
<li>The malware establishes a communication channel with a Telegram bot controlled by the attacker using the resolved IP address.</li>
<li>The attacker sends commands to the bot, which are relayed to the compromised system.</li>
<li>The malware executes the received commands, potentially including data exfiltration or further malicious actions.</li>
<li>The malware exfiltrates sensitive data to the attacker via the Telegram bot.</li>
<li>The attacker maintains persistent access and control over the compromised system via the Telegram bot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can be remotely controlled by attackers, leading to data theft, system disruption, or further propagation of malware within the network. The use of Telegram bots enables covert communication, making it difficult to detect malicious activity using traditional methods. Multiple threat actors employ Telegram-based C2, including those associated with information stealers, keyloggers, and crypto-mining malware. A successful attack can lead to significant data breaches and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Telegram DNS Queries</code> to your SIEM to identify processes making DNS queries to the Telegram API (api.telegram.org) other than the legitimate Telegram application.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the process execution history, network connections, and related system activity.</li>
<li>Block the domain <code>api.telegram.org</code> at the DNS resolver or firewall to prevent compromised systems from communicating with Telegram bots, unless legitimate business use requires it.</li>
<li>Enable Sysmon Event ID 22 (DNS Query) logging to capture DNS query events on endpoints.</li>
<li>Update Sysmon to at least version 6.0.4 to ensure comprehensive DNS event logging.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>telegram</category><category>command-and-control</category><category>dns</category><category>windows</category></item><item><title>CoreDNS Transfer Plugin ACL Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-coredns-acl-bypass/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-coredns-acl-bypass/</guid><description>CoreDNS' transfer plugin prior to version 1.14.3 can select the wrong ACL stanza due to lexicographic comparison, leading to unauthorized zone transfers by clients intended to be denied by subzone-specific transfer policies.</description><content:encoded><![CDATA[<p>A vulnerability exists in the CoreDNS transfer plugin related to Access Control List (ACL) stanza selection. When both a parent zone and a more-specific subzone are configured with transfer rules, CoreDNS versions prior to 1.14.3 may incorrectly prioritize the parent zone&rsquo;s rule over the subzone&rsquo;s due to a lexicographic string comparison instead of a proper longest-match algorithm. This can lead to a permissive parent-zone transfer rule overriding a more restrictive subzone rule, allowing unauthorized clients to perform AXFR/IXFR requests and retrieve zone contents they should not have access to. This vulnerability matters because it can expose sensitive DNS information to unauthorized parties, potentially aiding reconnaissance or enabling further attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a CoreDNS server running a version prior to 1.14.3.</li>
<li>The attacker determines that the CoreDNS server is configured with both a parent zone (e.g., example.org.) and a subzone (e.g., a.example.org.) with different transfer ACLs. The parent zone&rsquo;s ACL is more permissive than the subzone&rsquo;s.</li>
<li>The attacker crafts an AXFR or IXFR request specifically targeting the subzone (a.example.org.).</li>
<li>The CoreDNS server&rsquo;s transfer plugin incorrectly selects the parent zone&rsquo;s ACL due to the lexicographic comparison logic, which favors &ldquo;example.org.&rdquo; over &ldquo;a.example.org.&rdquo;.</li>
<li>The server authorizes the transfer based on the permissive parent zone ACL.</li>
<li>The CoreDNS server responds to the attacker&rsquo;s request, providing the full zone contents of the subzone.</li>
<li>The attacker receives the zone data, gaining access to information such as hostnames, IP addresses, and other DNS records that should have been protected by the subzone&rsquo;s restrictive ACL.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthorized zone transfers, exposing sensitive DNS information. The impact is significant as it can lead to the disclosure of internal network structures, server names, and other critical data, potentially facilitating reconnaissance for further attacks. The severity is compounded by the non-intuitive nature of the vulnerability, making it difficult to detect and remediate without a clear understanding of the underlying issue.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade CoreDNS to version 1.14.3 or later to address the vulnerability (CVE-2026-33489).</li>
<li>Review CoreDNS transfer configurations to ensure subzone ACLs are not inadvertently bypassed by more permissive parent zone ACLs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33489</category><category>acl-bypass</category><category>dns</category><category>zone-transfer</category><category>coredns</category></item></channel></rss>