CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

nic

knot_resolver

14 known vulnerabilities · sorted by CVSS score

CVE-2018-1110
HIGH7.5

A flaw was found in knot-resolver before version 2.3.0. Malformed DNS messages may cause denial of service.

nic / knot_resolver
Network
Published Mar 30, 2021
CVE-2022-40188
HIGH7.5

Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets.

nic / knot_resolver+4
Network
Published Sep 23, 2022
CVE-2019-19331
HIGH7.5

knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB).

nic / knot_resolver+1
Network
Published Dec 16, 2019
CVE-2019-10191
HIGH7.5

A vulnerability was discovered in DNS resolver of knot resolver before version 4.1.0 which allows remote attackers to downgrade DNSSEC-secure domains to DNSSEC-insecure state, opening possibility of domain hijack using attacks against insecure DNS protocol.

nic / knot_resolver+2
Network
Published Jul 16, 2019
CVE-2023-46317
HIGH7.5

Knot Resolver before 5.7.0 performs many TCP reconnections upon receiving certain nonsensical responses from servers.

nic / knot_resolver
Network
Published Oct 22, 2023
CVE-2023-26249
HIGH7.5

Knot Resolver before 5.6.0 enables attackers to consume its resources, launching amplification attacks and potentially causing a denial of service. Specifically, a single client query may lead to a hundred TCP connection attempts if a DNS server closes connections without providing a response.

nic / knot_resolver
Network
Published Feb 21, 2023
CVE-2023-50387
HIGH7.5

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.

redhat / enterprise_linux+20
Network
Published Feb 14, 2024
CVE-2020-12667
HIGH7.5

Knot Resolver before 5.1.1 allows traffic amplification via a crafted DNS answer from an attacker-controlled server, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.

nic / knot_resolver
Network
Published May 19, 2020
CVE-2021-40083
HIGH7.5

Knot Resolver before 5.3.2 is prone to an assertion failure, triggerable by a remote attacker in an edge case (NSEC3 with too many iterations used for a positive wildcard proof).

nic / knot_resolver
Network
Published Aug 25, 2021
CVE-2019-10190
HIGH7.5

A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 before 4.1.0 which allows remote attackers to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation failed, instead of sending a SERVFAIL packet. Caching is not affected by this particular bug but see CVE-2019-10191.

nic / knot_resolver+3
Network
Published Jul 16, 2019
CVE-2018-10920
MEDIUM6.8

Improper input validation bug in DNS resolver component of Knot Resolver before 2.4.1 allows remote attacker to poison cache.

nic / knot_resolver
Network
Published Aug 2, 2018
CVE-2013-5661
MEDIUM5.9

Cache Poisoning issue exists in DNS Response Rate Limiting.

isc / bind+4
Network
Published Nov 5, 2019
CVE-2022-32983
MEDIUM5.3

Knot Resolver through 5.5.1 may allow DNS cache poisoning when there is an attempt to limit forwarding actions by filters.

nic / knot_resolver
Network
Published Jun 20, 2022
CVE-2018-1000002
LOW3.7

Improper input validation bugs in DNSSEC validators components in Knot Resolver (prior version 1.5.2) allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay.

nic / knot_resolver
Network
Published Jan 22, 2018