HIGH · 7.5

CVE-2022-33988

dproxy-nexgen (aka dproxy nexgen) re-uses the DNS transaction id (TXID) value from client queries, which allows attackers (able to send queries to the resolver) to conduct DNS cache-poisoning attacks ...

Vulnerability Description

dproxy-nexgen (aka dproxy nexgen) re-uses the DNS transaction id (TXID) value from client queries, which allows attackers (able to send queries to the resolver) to conduct DNS cache-poisoning attacks because the TXID value is known to the attacker.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
Dproxy-Nexgen ProjectDproxy-Nexgen-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-33988?

CVE-2022-33988 is a vulnerability with a CVSS score of 7.5 (HIGH). dproxy-nexgen (aka dproxy nexgen) re-uses the DNS transaction id (TXID) value from client queries, which allows attackers (able to send queries to the resolver) to conduct DNS cache-poisoning attacks ...

How severe is CVE-2022-33988?

CVE-2022-33988 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-33988?

Check the references section above for vendor advisories and patch information. Affected products include: Dproxy-Nexgen Project Dproxy-Nexgen.