CVE-2024-52615

5.3 MEDIUM

📋 TL;DR

This vulnerability in Avahi-daemon allows attackers to more easily inject malicious DNS responses by exploiting predictable source ports in wide-area DNS queries. It affects systems running Avahi-daemon with wide-area DNS enabled, potentially leading to DNS spoofing or cache poisoning attacks. The risk is highest for systems that rely on Avahi for service discovery across networks.

💻 Affected Systems

Products:
  • Avahi-daemon
Versions: Versions prior to the patched releases (check specific vendor advisories)
Operating Systems: Linux distributions including RHEL, Fedora, Debian, Ubuntu
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when wide-area DNS is enabled (not default in most configurations). Requires attacker to be able to send DNS responses to the predictable source port.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Successful DNS cache poisoning leading to traffic redirection, man-in-the-middle attacks, or service disruption through malicious DNS responses.

🟠

Likely Case

DNS spoofing attacks that could redirect users to malicious sites or intercept network traffic in controlled environments.

🟢

If Mitigated

Limited impact if network segmentation, DNS security extensions (DNSSEC), or proper firewall rules are in place to restrict DNS traffic.

🌐 Internet-Facing: MEDIUM - Systems exposed to the internet with Avahi wide-area DNS enabled are vulnerable to remote DNS injection attacks.
🏢 Internal Only: LOW - Internal network attacks require attacker presence on the local network and specific conditions for successful exploitation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to send DNS responses and knowledge of the predictable source port. Timing attacks may be necessary for successful injection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor-specific updates (e.g., RHEL advisories RHSA-2025:11402, RHSA-2025:16441)

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2024-52615

Restart Required: Yes

Instructions:

1. Update Avahi-daemon package using your distribution's package manager. 2. For RHEL: 'yum update avahi'. 3. Restart Avahi service: 'systemctl restart avahi-daemon'. 4. Verify the update with 'avahi-daemon --version'.

🔧 Temporary Workarounds

Disable wide-area DNS

linux

Prevents the vulnerable functionality by disabling wide-area DNS queries in Avahi configuration.

Edit /etc/avahi/avahi-daemon.conf
Set 'enable-wide-area=no'
Restart service: 'systemctl restart avahi-daemon'

Firewall restriction

linux

Block external DNS traffic to Avahi's predictable ports to prevent injection attacks.

iptables -A INPUT -p udp --dport 5353 -j DROP
iptables -A INPUT -p tcp --dport 5353 -j DROP

🧯 If You Can't Patch

  • Disable Avahi-daemon entirely if not needed: 'systemctl disable --now avahi-daemon'
  • Implement network segmentation to isolate systems running Avahi from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if wide-area DNS is enabled: 'grep enable-wide-area /etc/avahi/avahi-daemon.conf' - if 'yes' and version is unpatched, system is vulnerable.

Check Version:

avahi-daemon --version

Verify Fix Applied:

Verify Avahi version is updated and wide-area DNS is disabled or system uses randomized source ports.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DNS query patterns in Avahi logs
  • Failed DNS resolution attempts from Avahi

Network Indicators:

  • DNS traffic on port 5353 from predictable source ports
  • Unexpected DNS responses to Avahi queries

SIEM Query:

source="avahi-daemon" AND (event="DNS query failed" OR event="unexpected DNS response")

🔗 References

📤 Share & Export