CVE Vulnerabilities

CVE-2023-7008

Channel Accessible by Non-Endpoint

Published: Dec 23, 2023 | Modified: Nov 04, 2025
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.

Weakness

The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.

Affected Software

NameVendorStart VersionEnd Version
SystemdSystemd_project25 (including)25 (including)
Red Hat Enterprise Linux 8RedHatsystemd-0:239-82.el8*
Red Hat Enterprise Linux 9RedHatsystemd-0:252-32.el9_4*
Red Hat Enterprise Linux 9RedHatsystemd-0:252-32.el9_4*
SystemdUbuntubionic*
SystemdUbuntudevel*
SystemdUbuntuesm-infra/focal*
SystemdUbuntufocal*
SystemdUbuntujammy*
SystemdUbuntulunar*
SystemdUbuntumantic*
SystemdUbuntunoble*
SystemdUbuntuoracular*
SystemdUbuntuplucky*
SystemdUbuntuquesting*
SystemdUbuntutrusty*
SystemdUbuntutrusty/esm*
SystemdUbuntuxenial*

Potential Mitigations

References