6.5
CVSSv3

CVE-2022-30698

Published: 01/08/2022 Updated: 12/08/2022
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8

Vulnerability Summary

NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable to a novel type of the "ghost domain names" attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a subdomain of a rogue domain name. The rogue nameserver returns delegation information for the subdomain that updates Unbound's delegation cache. This action can be repeated before expiry of the delegation information by querying Unbound for a second level subdomain which the rogue nameserver provides new delegation information. Since Unbound is a child-centric resolver, the ever-updating child delegation information can keep a rogue domain name resolvable long after revocation. From version 1.16.2 on, Unbound checks the validity of parent delegation records before using cached delegation information.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

nlnetlabs unbound

Vendor Advisories

Debian Bug report logs - #1016493 unbound: CVE-2022-30698 CVE-2022-30699 Package: src:unbound; Maintainer for src:unbound is unbound packagers <unbound@packagesdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 1 Aug 2022 19:48:01 UTC Severity: important Tags: security, upstream Found in ...
NLnet Labs Unbound, up to and including version 1161 is vulnerable to a novel type of the "ghost domain names" attack The vulnerability works by targeting an Unbound instance Unbound is queried for a subdomain of a rogue domain name The rogue nameserver returns delegation information for the subdomain that updates Unbound's d ...