CVE-2026-26018

7.5 HIGH

📋 TL;DR

A denial of service vulnerability in CoreDNS's loop detection plugin allows attackers to crash DNS servers by sending specially crafted DNS queries. The vulnerability affects CoreDNS versions prior to 1.14.2 due to predictable pseudo-random number generation combined with a fatal error handler. Organizations running vulnerable CoreDNS instances are affected.

💻 Affected Systems

Products:
  • CoreDNS
Versions: All versions prior to 1.14.2
Operating Systems: All platforms running CoreDNS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the loop detection plugin which is commonly used to prevent DNS amplification attacks.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete DNS service outage causing unavailability of DNS resolution for all dependent services and applications.

🟠

Likely Case

Intermittent DNS server crashes leading to service disruptions and degraded DNS resolution performance.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and recovery.

🌐 Internet-Facing: HIGH - DNS servers are typically internet-facing and directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal DNS servers could be targeted by compromised internal systems or malicious insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted DNS queries but does not require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.14.2

Vendor Advisory: https://github.com/coredns/coredns/security/advisories/GHSA-h75p-j8xm-m278

Restart Required: Yes

Instructions:

1. Download CoreDNS 1.14.2 or later from GitHub releases. 2. Stop the current CoreDNS service. 3. Replace the binary with the patched version. 4. Restart the CoreDNS service. 5. Verify the service is running correctly.

🔧 Temporary Workarounds

Disable loop detection plugin

all

Remove or disable the loop detection plugin from CoreDNS configuration to eliminate the vulnerable component.

Edit Corefile to remove 'loop' plugin from server blocks

Network filtering

linux

Implement network ACLs to restrict DNS queries to trusted sources only.

iptables -A INPUT -p udp --dport 53 -s trusted_networks -j ACCEPT
iptables -A INPUT -p tcp --dport 53 -s trusted_networks -j ACCEPT
iptables -A INPUT -p udp --dport 53 -j DROP
iptables -A INPUT -p tcp --dport 53 -j DROP

🧯 If You Can't Patch

  • Implement rate limiting on DNS queries to reduce attack surface
  • Deploy redundant DNS servers with load balancing to maintain service during attacks

🔍 How to Verify

Check if Vulnerable:

Check CoreDNS version with 'coredns -version' and verify it's below 1.14.2

Check Version:

coredns -version

Verify Fix Applied:

Confirm version is 1.14.2 or higher with 'coredns -version' and test DNS resolution functionality

📡 Detection & Monitoring

Log Indicators:

  • CoreDNS process crashes or restarts
  • Fatal error messages related to loop detection
  • Unusual spike in DNS query volume

Network Indicators:

  • Repeated DNS queries with similar patterns
  • DNS queries to non-existent or malformed domains
  • Unusual source IPs sending high volumes of DNS queries

SIEM Query:

source="coredns" AND ("fatal" OR "panic" OR "crash") OR (dns.query_count > threshold)

🔗 References

📤 Share & Export