Unknown
CVE-2020-8625
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2020-8625
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND’s default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 –> 9.11.27, 9.12.0 –> 9.16.11, and versions BIND 9.11.3-S1 –> 9.11.27-S1 and 9.16.8-S1 –> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 –> 9.17.1 of the BIND 9.17 development branch
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- debian,
- fedoraproject,
- isc,
- netapp,
- siemens
Products
- 500f firmware -,
- a250 firmware -,
- bind,
- bind 9.11.21,
- bind 9.11.27,
- bind 9.11.3,
- bind 9.11.5,
- bind 9.11.6,
- bind 9.11.7,
- bind 9.11.8,
- bind 9.16.11,
- bind 9.16.8,
- bind 9.17.0,
- bind 9.17.1,
- cloud backup -,
- debian linux 10.0,
- debian linux 9.0,
- fedora 32,
- fedora 33,
- fedora 34,
- sinec infrastructure network services
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: