Impact
CoreDNS versions before 1.14.3 contain a false-accept bug in TSIG handling across gRPC, QUIC, DoH, and DoH3 transports. The server verifies the presence of a configured key name but never validates the HMAC, and for DoH/DoH3 it ignores TSIG records entirely. As a result, any request that includes a TSIG record is treated as authenticated, granting the attacker the ability to perform zone transfers (AXFR/IXFR), dynamic updates, or other privileged operations that would normally require a valid TSIG key. This flaw is a classic authentication bypass (CWE‑287).
Affected Systems
The vulnerable component is the CoreDNS DNS server provided by the coredns organization. All releases prior to 1.14.3 are affected. CoreDNS is widely deployed in Kubernetes and cloud-native environments as the default DNS server. The issue is resolved in release 1.14.3 and later.
Risk and Exploitability
The CVSS score of 8.2 reflects significant remote impact. Although no EPSS value is available, the vulnerability is exploitable by any network adversary with reach to the affected ports; the attacker does not need to know a valid key for DoH or DoH3. The vulnerability is not listed in the CISA KEV catalog, but the lack of persistence does not diminish the risk to environments exposing TSIG-enabled transports. The attack path involves sending a forged TSIG‑bearing packet to the server and receiving privileged actions such as unauthorized zone data or server state changes.
OpenCVE Enrichment
Github GHSA