๐Ÿ” CVE Alert

CVE-2026-35579

UNKNOWN 0.0

CoreDNS TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

CoreDNS is a DNS server written in Go. In versions prior to 1.14.3, the gRPC, QUIC, DoH, and DoH3 transport implementations incorrectly handle TSIG authentication. For gRPC and QUIC, the server checks whether the TSIG key name exists in the configuration but never calls dns.TsigVerify() to validate the HMAC. If the key name matches a configured key, the tsigStatus field remains nil and the tsig plugin treats the request as successfully authenticated regardless of the MAC value. For DoH and DoH3, the issue is more severe: the DoHWriter.TsigStatus() method unconditionally returns nil, and the server never inspects the TSIG record at all. Any request containing a TSIG record is treated as authenticated over DoH and DoH3, even if the key name is invalid and the MAC is arbitrary. An unauthenticated network attacker can exploit this to bypass TSIG-protected functionality such as AXFR/IXFR zone transfers, dynamic DNS updates, or other TSIG-gated plugin behavior. The DoH and DoH3 variants have a lower exploitation bar because the attacker does not need to know a valid TSIG key name. This issue has been fixed in version 1.14.3. As a workaround, disable gRPC, QUIC, DoH, and DoH3 listeners where TSIG authentication is required, or restrict network-level access to affected transport ports to trusted sources only.

CWE CWE-287
Vendor coredns
Product coredns
Published May 5, 2026
Stay Ahead of the Next One

Get instant alerts for coredns coredns

Be the first to know when new unknown vulnerabilities affecting coredns coredns are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

coredns / coredns
< 1.14.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/coredns/coredns/security/advisories/GHSA-vp29-5652-4fw9