First published: Wed Jul 01 2020(Updated: )
In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS Recursor | <=4.1.16 | |
PowerDNS Recursor | >=4.2.0<=4.2.2 | |
PowerDNS Recursor | >=4.3.0<=4.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14196 is a vulnerability in PowerDNS Recursor versions up to and including 4.3.1, 4.2.2, and 4.1.16 that allows unauthorized access to the internal web server.
CVE-2020-14196 has a severity score of 5.3 which is considered medium.
The affected software for CVE-2020-14196 is PowerDNS Recursor versions up to and including 4.3.1, 4.2.2, and 4.1.16.
To enforce the ACL restricting access to the internal web server in PowerDNS Recursor, it is recommended to upgrade to a version higher than 4.3.1, 4.2.2, and 4.1.16.
You can find more information about CVE-2020-14196 at the following references: [Link 1](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00043.html), [Link 2](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00042.html), [Link 3](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00044.html)