CVE-2020-8616

8.6 HIGH

📋 TL;DR

CVE-2020-8616 is a DNS vulnerability that allows attackers to cause recursive DNS servers to perform excessive queries through malicious referrals, potentially degrading server performance or enabling DNS amplification attacks. This affects BIND 9 DNS servers configured as recursive resolvers.

💻 Affected Systems

Products:
  • ISC BIND
Versions: BIND 9.0.0 through 9.16.5, 9.17.0 through 9.17.3
Operating Systems: All operating systems running affected BIND versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects BIND servers configured as recursive resolvers; authoritative-only servers are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

DNS amplification attack with high traffic volume causing denial of service to both the target and the recursive server, potentially disrupting DNS services for entire networks.

🟠

Likely Case

Degraded performance of recursive DNS servers under attack, causing slower DNS resolution for legitimate users and potential service disruption.

🟢

If Mitigated

Minimal impact with proper rate limiting and patched systems, though some performance degradation possible during attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Known as NXNSAttack; exploitation tools and research papers are publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BIND 9.16.6, 9.17.4, or later versions

Vendor Advisory: https://kb.isc.org/docs/cve-2020-8616

Restart Required: Yes

Instructions:

1. Download patched BIND version from ISC website 2. Stop BIND service 3. Install updated version 4. Restart BIND service 5. Verify service is running correctly

🔧 Temporary Workarounds

Rate Limiting Configuration

all

Configure BIND to limit the number of simultaneous queries and responses per client

Add to named.conf: rate-limit { responses-per-second 10; };
Add to named.conf: max-clients-per-query 10;

Disable Recursion for Unauthorized Clients

all

Restrict recursive queries to trusted clients only

Add to named.conf: allow-recursion { trusted-nets; };

🧯 If You Can't Patch

  • Implement network-level rate limiting for DNS traffic
  • Deploy DNS firewall or protective DNS service

🔍 How to Verify

Check if Vulnerable:

Check BIND version with: named -v

Check Version:

named -v

Verify Fix Applied:

Verify version is 9.16.6+, 9.17.4+, or later with: named -v

📡 Detection & Monitoring

Log Indicators:

  • Unusually high query rates from single sources
  • Excessive referral responses
  • Query timeouts or failures

Network Indicators:

  • Spike in DNS traffic volume
  • Abnormal number of NXDOMAIN responses
  • DNS amplification patterns

SIEM Query:

source_port=53 AND (bytes_sent > 1000) | stats count by src_ip

🔗 References

📤 Share & Export