Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-35579— CoreDNS TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports

EPSS 0.07% · P21
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-35579

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
CoreDNS TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports
Source: NVD (National Vulnerability Database)
Vulnerability Description
CoreDNS is a DNS server written in Go. In versions prior to 1.14.3, the gRPC, QUIC, DoH, and DoH3 transport implementations incorrectly handle TSIG authentication. For gRPC and QUIC, the server checks whether the TSIG key name exists in the configuration but never calls dns.TsigVerify() to validate the HMAC. If the key name matches a configured key, the tsigStatus field remains nil and the tsig plugin treats the request as successfully authenticated regardless of the MAC value. For DoH and DoH3, the issue is more severe: the DoHWriter.TsigStatus() method unconditionally returns nil, and the server never inspects the TSIG record at all. Any request containing a TSIG record is treated as authenticated over DoH and DoH3, even if the key name is invalid and the MAC is arbitrary. An unauthenticated network attacker can exploit this to bypass TSIG-protected functionality such as AXFR/IXFR zone transfers, dynamic DNS updates, or other TSIG-gated plugin behavior. The DoH and DoH3 variants have a lower exploitation bar because the attacker does not need to know a valid TSIG key name. This issue has been fixed in version 1.14.3. As a workaround, disable gRPC, QUIC, DoH, and DoH3 listeners where TSIG authentication is required, or restrict network-level access to affected transport ports to trusted sources only.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
认证机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
CoreDNS 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
CoreDNS是CoreDNS社区的一个 DNS 服务器。 CoreDNS 1.14.3之前版本存在授权问题漏洞,该漏洞源于gRPC、QUIC、DoH和DoH3传输实现错误处理TSIG身份验证,可能导致未经身份验证的网络攻击者绕过TSIG保护功能。以下版本受到影响:1.14.3之前版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
corednscoredns < 1.14.3 -

II. Public POCs for CVE-2026-35579

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-35579

登录查看更多情报信息。

Same Patch Batch · coredns · 2026-05-05 · 5 CVEs total

CVE-2026-32936CoreDNS DoH GET path missing size validation causes CPU and memory amplification
CVE-2026-32934CoreDNS DNS-over-QUIC unbounded goroutine growth leads to denial of service
CVE-2026-33489CoreDNS transfer plugin subzone ACL bypass via lexicographic zone comparison
CVE-2026-33190CoreDNS TSIG authentication bypass on encrypted DNS transports

IV. Related Vulnerabilities

V. Comments for CVE-2026-35579

No comments yet


Leave a comment