icon

We found results for “

CVE-2025-58063

Good to know:

icon
icon

Date: September 9, 2025

CoreDNS is a DNS server that chains plugins. Starting in version 1.2.0 and prior to version 1.12.4, the CoreDNS etcd plugin contains a TTL confusion vulnerability where lease IDs are incorrectly used as TTL values, enabling DNS cache pinning attacks. This effectively creates a DoS condition for DNS resolution of affected services. The "TTL()" function in "plugin/etcd/etcd.go" incorrectly casts etcd lease IDs (64-bit integers) to uint32 and uses them as TTL values. Large lease IDs become very large TTLs when cast to uint32. This enables cache pinning attacks. Version 1.12.4 contains a fix for the issue.

Severity Score

Severity Score

Weakness Type (CWE)

Incorrect Conversion between Numeric Types

CWE-681

Top Fix

icon

Upgrade Version

Upgrade to version github.com/coredns/coredns - v1.12.4;https://github.com/coredns/coredns.git - v1.12.4

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): LOW
Availability (A): HIGH

Do you need more information?

Contact Us