CVE-2024-52615
📋 TL;DR
This vulnerability in Avahi-daemon allows attackers to more easily inject malicious DNS responses by exploiting predictable source ports in wide-area DNS queries. It affects systems running Avahi-daemon with wide-area DNS enabled, potentially leading to DNS spoofing or cache poisoning attacks. The risk is highest for systems that rely on Avahi for service discovery across networks.
💻 Affected Systems
- Avahi-daemon
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Successful DNS cache poisoning leading to traffic redirection, man-in-the-middle attacks, or service disruption through malicious DNS responses.
Likely Case
DNS spoofing attacks that could redirect users to malicious sites or intercept network traffic in controlled environments.
If Mitigated
Limited impact if network segmentation, DNS security extensions (DNSSEC), or proper firewall rules are in place to restrict DNS traffic.
🎯 Exploit Status
Exploitation requires network access to send DNS responses and knowledge of the predictable source port. Timing attacks may be necessary for successful injection.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor-specific updates (e.g., RHEL advisories RHSA-2025:11402, RHSA-2025:16441)
Vendor Advisory: https://access.redhat.com/security/cve/CVE-2024-52615
Restart Required: Yes
Instructions:
1. Update Avahi-daemon package using your distribution's package manager. 2. For RHEL: 'yum update avahi'. 3. Restart Avahi service: 'systemctl restart avahi-daemon'. 4. Verify the update with 'avahi-daemon --version'.
🔧 Temporary Workarounds
Disable wide-area DNS
linuxPrevents the vulnerable functionality by disabling wide-area DNS queries in Avahi configuration.
Edit /etc/avahi/avahi-daemon.conf
Set 'enable-wide-area=no'
Restart service: 'systemctl restart avahi-daemon'
Firewall restriction
linuxBlock external DNS traffic to Avahi's predictable ports to prevent injection attacks.
iptables -A INPUT -p udp --dport 5353 -j DROP
iptables -A INPUT -p tcp --dport 5353 -j DROP
🧯 If You Can't Patch
- Disable Avahi-daemon entirely if not needed: 'systemctl disable --now avahi-daemon'
- Implement network segmentation to isolate systems running Avahi from untrusted networks
🔍 How to Verify
Check if Vulnerable:
Check if wide-area DNS is enabled: 'grep enable-wide-area /etc/avahi/avahi-daemon.conf' - if 'yes' and version is unpatched, system is vulnerable.
Check Version:
avahi-daemon --version
Verify Fix Applied:
Verify Avahi version is updated and wide-area DNS is disabled or system uses randomized source ports.
📡 Detection & Monitoring
Log Indicators:
- Unusual DNS query patterns in Avahi logs
- Failed DNS resolution attempts from Avahi
Network Indicators:
- DNS traffic on port 5353 from predictable source ports
- Unexpected DNS responses to Avahi queries
SIEM Query:
source="avahi-daemon" AND (event="DNS query failed" OR event="unexpected DNS response")