Vulnerability Details : CVE-2023-28456
An issue was discovered in Technitium through 11.0.2. It enables attackers to launch amplification attacks (3 times more than other "golden model" software like BIND) and cause potential DoS.
Vulnerability category: Denial of service
Products affected by CVE-2023-28456
- cpe:2.3:a:technitium:dns_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:technitium:dnsserver:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-28456
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-28456
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-09-18 |
CWE ids for CVE-2023-28456
-
The product does not sufficiently monitor or control transmitted network traffic volume, so that an actor can cause the product to transmit more traffic than should be allowed for that actor.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2023-28456
-
https://technitium.com/dns/
Technitium DNS Server | An Open Source DNS Server For Privacy & SecurityProduct
-
https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3
Information for CVE-2023-28451, CVE-2023-28457, CVE-2023-28455, CVE-2023-28456, CVE-2023-49203 ยท GitHubThird Party Advisory
Jump to