CVE-2020-8623

7.5 HIGH

📋 TL;DR

CVE-2020-8623 is a denial-of-service vulnerability in BIND DNS servers where specially crafted queries can cause the server to crash. Affected systems must be running BIND built with native PKCS11 support and using RSA keys for zone signing. This primarily impacts DNS servers that are internet-facing and configured with specific cryptographic settings.

💻 Affected Systems

Products:
  • ISC BIND
Versions: 9.10.0 to 9.11.21, 9.12.0 to 9.16.5, 9.17.0 to 9.17.3, and BIND 9 Supported Preview Edition 9.10.5-S1 to 9.11.21-S1
Operating Systems: All operating systems running affected BIND versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when BIND was built with --enable-native-pkcs11 flag AND is signing zones with RSA keys

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

DNS service becomes completely unavailable, causing widespread service disruption for all dependent systems and applications.

🟠

Likely Case

Intermittent DNS service outages affecting resolution for clients, potentially leading to application failures.

🟢

If Mitigated

Limited impact with proper network segmentation and query rate limiting in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted DNS queries to vulnerable servers

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BIND 9.11.22, 9.16.6, 9.17.4, and corresponding Supported Preview Edition versions

Vendor Advisory: https://kb.isc.org/docs/cve-2020-8623

Restart Required: Yes

Instructions:

1. Download patched version from ISC or your distribution's repository. 2. Stop BIND service. 3. Install updated package. 4. Start BIND service. 5. Verify service is running correctly.

🔧 Temporary Workarounds

Disable RSA zone signing

all

Switch to ECDSA or other non-RSA algorithms for zone signing

# Edit zone configuration to use non-RSA keys
# Update dnssec-keygen and dnssec-signzone commands

Implement query rate limiting

linux

Limit query rates to reduce attack surface

# Add to named.conf:
options {
  rate-limit {
    responses-per-second 10;
    window 5;
  };
};

🧯 If You Can't Patch

  • Implement strict network ACLs to limit DNS queries to trusted sources only
  • Deploy DNS query filtering or firewall rules to block suspicious query patterns

🔍 How to Verify

Check if Vulnerable:

Check BIND version with 'named -v' and verify if built with --enable-native-pkcs11 and using RSA keys

Check Version:

named -v

Verify Fix Applied:

Confirm BIND version is 9.11.22, 9.16.6, 9.17.4 or higher with 'named -v'

📡 Detection & Monitoring

Log Indicators:

  • Unexpected BIND process crashes
  • High volume of malformed DNS queries
  • Error messages related to PKCS11 or RSA operations

Network Indicators:

  • Spike in DNS query traffic from single sources
  • Malformed DNS packets targeting vulnerable servers

SIEM Query:

source="bind" AND (event="crash" OR event="segfault") OR (query_type="ANY" AND query_count>1000)

🔗 References

📤 Share & Export