← Zuruck zu CVEs
CVE-2026-26017
HIGH7.7
Beschreibung
CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the rewrite plugin, resulting in a Time-of-Check Time-of-Use (TOCTOU) flaw. This issue has been patched in version 1.14.2.
CVE Details
CVSS v3.1 Bewertung7.7
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht3/6/2026
Zuletzt geandert3/9/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
coredns.io:coredns
Schwachen (CWE)
CWE-367
Referenzen
https://github.com/coredns/coredns/releases/tag/v1.14.2(security-advisories@github.com)
https://github.com/coredns/coredns/security/advisories/GHSA-c9v3-4pv7-87pr(security-advisories@github.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.