<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Unbound — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/unbound/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 12:15:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/unbound/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unbound Cache Poisoning Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-unbound-cache-poisoning/</link><pubDate>Tue, 19 May 2026 12:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-unbound-cache-poisoning/</guid><description>A vulnerability in Unbound allows an attacker from an adjacent network to manipulate the cache, potentially leading to domain hijacking.</description><content:encoded><![CDATA[<p>A vulnerability exists within NLnet Labs Unbound DNS resolver that could be exploited by a threat actor positioned on an adjacent network. Successful exploitation allows the attacker to manipulate the DNS cache. This manipulation could redirect users to malicious servers when they attempt to access legitimate domains. This can lead to various malicious outcomes, including credential theft, malware distribution, or disinformation campaigns. This vulnerability poses a significant risk to organizations relying on Unbound for DNS resolution as it can undermine the integrity of their network traffic. Defenders should implement detection and mitigation strategies to protect against potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to an adjacent network or performs on-path attack.</li>
<li>The attacker sends malicious DNS responses to the Unbound resolver.</li>
<li>The malicious responses contain false information about the IP addresses of legitimate domains.</li>
<li>Unbound resolver caches the false DNS information.</li>
<li>A user on the network queries the Unbound resolver for a legitimate domain.</li>
<li>Unbound returns the attacker-controlled IP address from its poisoned cache.</li>
<li>The user is redirected to a malicious server controlled by the attacker.</li>
<li>The attacker can then perform malicious activities, such as serving malware or stealing credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to widespread domain hijacking within the affected network. Users attempting to access legitimate websites would be redirected to attacker-controlled servers, potentially exposing them to malware infections or phishing attacks. The impact could range from credential theft and financial loss to the spread of misinformation. The number of affected victims depends on the size of the network relying on the vulnerable Unbound resolver.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Unbound DNS Cache Poisoning</code> to identify suspicious DNS responses indicative of cache poisoning attempts (log source: <code>dns_query</code>).</li>
<li>Monitor network traffic for DNS queries resolving to unusual or unexpected IP addresses, especially those originating from the adjacent network (log source: <code>network_connection</code>).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>unbound</category><category>dns</category><category>cache poisoning</category><category>domain hijacking</category><category>defense-evasion</category></item></channel></rss>