Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-6475

Summary
Assigner-isc
Assigner Org ID-404fd4d2-a609-4245-b543-2c944a302a22
Published At-17 Oct, 2019 | 19:17
Updated At-16 Sep, 2024 | 17:54
Rejected At-
Credits

A flaw in mirror zone validity checking can allow zone data to be spoofed

Mirror zones are a BIND feature allowing recursive servers to pre-cache zone data provided by other servers. A mirror zone is similar to a zone of type secondary, except that its data is subject to DNSSEC validation before being used in answers, as if it had been looked up via traditional recursion, and when mirror zone data cannot be validated, BIND falls back to using traditional recursion instead of the mirror zone. However, an error in the validity checks for the incoming zone data can allow an on-path attacker to replace zone data that was validated with a configured trust anchor with forged data of the attacker's choosing. The mirror zone feature is most often used to serve a local copy of the root zone. If an attacker was able to insert themselves into the network path between a recursive server using a mirror zone and a root name server, this vulnerability could then be used to cause the recursive server to accept a copy of falsified root zone data. This affects BIND versions 9.14.0 up to 9.14.6, and 9.15.0 up to 9.15.4.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:isc
Assigner Org ID:404fd4d2-a609-4245-b543-2c944a302a22
Published At:17 Oct, 2019 | 19:17
Updated At:16 Sep, 2024 | 17:54
Rejected At:
▼CVE Numbering Authority (CNA)
A flaw in mirror zone validity checking can allow zone data to be spoofed

Mirror zones are a BIND feature allowing recursive servers to pre-cache zone data provided by other servers. A mirror zone is similar to a zone of type secondary, except that its data is subject to DNSSEC validation before being used in answers, as if it had been looked up via traditional recursion, and when mirror zone data cannot be validated, BIND falls back to using traditional recursion instead of the mirror zone. However, an error in the validity checks for the incoming zone data can allow an on-path attacker to replace zone data that was validated with a configured trust anchor with forged data of the attacker's choosing. The mirror zone feature is most often used to serve a local copy of the root zone. If an attacker was able to insert themselves into the network path between a recursive server using a mirror zone and a root name server, this vulnerability could then be used to cause the recursive server to accept a copy of falsified root zone data. This affects BIND versions 9.14.0 up to 9.14.6, and 9.15.0 up to 9.15.4.

Affected Products
Vendor
Internet Systems Consortium, Inc.ISC
Product
BIND 9
Versions
Affected
  • 9.14.0 up to 9.14.6
  • 9.15.0 up to 9.15.4
Problem Types
TypeCWE IDDescription
textN/AAn on-path attacker who manages to successfully exploit this vulnerability can replace the mirrored zone (usually the root) with data of their own choosing, effectively bypassing DNSSEC protection.
Type: text
CWE ID: N/A
Description: An on-path attacker who manages to successfully exploit this vulnerability can replace the mirrored zone (usually the root) with data of their own choosing, effectively bypassing DNSSEC protection.
Metrics
VersionBase scoreBase severityVector
3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Upgrade to the patched release most closely related to your current version of BIND: + BIND 9.14.7 + BIND 9.15.5

Configurations

Workarounds

The vulnerability can be avoided by not using mirror zones.

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://kb.isc.org/docs/cve-2019-6475
x_refsource_CONFIRM
https://security.netapp.com/advisory/ntap-20191024-0004/
x_refsource_CONFIRM
https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSS
x_refsource_CONFIRM
Hyperlink: https://kb.isc.org/docs/cve-2019-6475
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.netapp.com/advisory/ntap-20191024-0004/
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSS
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://kb.isc.org/docs/cve-2019-6475
x_refsource_CONFIRM
x_transferred
https://security.netapp.com/advisory/ntap-20191024-0004/
x_refsource_CONFIRM
x_transferred
https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSS
x_refsource_CONFIRM
x_transferred
Hyperlink: https://kb.isc.org/docs/cve-2019-6475
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20191024-0004/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSS
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-officer@isc.org
Published At:17 Oct, 2019 | 20:15
Updated At:07 Nov, 2023 | 03:13

Mirror zones are a BIND feature allowing recursive servers to pre-cache zone data provided by other servers. A mirror zone is similar to a zone of type secondary, except that its data is subject to DNSSEC validation before being used in answers, as if it had been looked up via traditional recursion, and when mirror zone data cannot be validated, BIND falls back to using traditional recursion instead of the mirror zone. However, an error in the validity checks for the incoming zone data can allow an on-path attacker to replace zone data that was validated with a configured trust anchor with forged data of the attacker's choosing. The mirror zone feature is most often used to serve a local copy of the root zone. If an attacker was able to insert themselves into the network path between a recursive server using a mirror zone and a root name server, this vulnerability could then be used to cause the recursive server to accept a copy of falsified root zone data. This affects BIND versions 9.14.0 up to 9.14.6, and 9.15.0 up to 9.15.4.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Secondary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
CPE Matches

Internet Systems Consortium, Inc.
isc
>>bind>>Versions from 9.14.0(inclusive) to 9.14.6(inclusive)
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>Versions from 9.15.0(inclusive) to 9.15.4(inclusive)
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-345Primarynvd@nist.gov
CWE ID: CWE-345
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://kb.isc.org/docs/cve-2019-6475security-officer@isc.org
Vendor Advisory
https://security.netapp.com/advisory/ntap-20191024-0004/security-officer@isc.org
Third Party Advisory
https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSSsecurity-officer@isc.org
N/A
Hyperlink: https://kb.isc.org/docs/cve-2019-6475
Source: security-officer@isc.org
Resource:
Vendor Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20191024-0004/
Source: security-officer@isc.org
Resource:
Third Party Advisory
Hyperlink: https://support.f5.com/csp/article/K42238532?utm_source=f5support&amp%3Butm_medium=RSS
Source: security-officer@isc.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

60Records found

CVE-2022-39199
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.05% / 16.47%
||
7 Day CHG~0.00%
Published-22 Nov, 2022 | 00:00
Updated-23 Apr, 2025 | 16:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lack of proper validation in immudb

immudb is a database with built-in cryptographic proof and verification. immudb client SDKs use server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. SDK does not validate this uuid and can accept any value reported by the server. A malicious server can change the reported UUID tricking the client to treat it as a different server thus accepting a state completely irrelevant to the one previously retrieved from the server. This issue has been patched in version 1.4.1. As a workaround, when initializing an immudb client object a custom state handler can be used to store the state. Providing custom implementation that ignores the server UUID can be used to ensure that even if the server changes the UUID, client will still consider it to be the same server.

Action-Not Available
Vendor-codenotarycodenotary
Product-immudbimmudb
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2017-12972
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.91%
||
7 Day CHG~0.00%
Published-20 Aug, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Nimbus JOSE+JWT before 4.39, there is no integer-overflow check when converting length values from bytes to bits, which allows attackers to conduct HMAC bypass attacks by shifting Additional Authenticated Data (AAD) and ciphertext so that different plaintext is obtained for the same HMAC.

Action-Not Available
Vendor-connect2idn/a
Product-nimbus_jose\+jwtn/a
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-3049
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.62% / 69.02%
||
7 Day CHG~0.00%
Published-06 Jun, 2024 | 05:30
Updated-01 Aug, 2025 | 15:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Booth: specially crafted hash can lead to invalid hmac being accepted by booth server

A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.

Action-Not Available
Vendor-clusterlabsRed Hat, Inc.
Product-enterprise_linux_for_ibm_z_systems_eusenterprise_linux_server_update_services_for_sap_solutionsboothenterprise_linuxenterprise_linux_for_ibm_z_systemsenterprise_linux_eusenterprise_linux_for_power_little_endian_eusenterprise_linux_for_arm_64Red Hat Enterprise Linux 10Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRed Hat Enterprise Linux 8.6 Telecommunications Update ServiceRed Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRed Hat Enterprise Linux 9Red Hat Enterprise Linux 8.8 Extended Update SupportRed Hat Enterprise Linux 8Red Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRed Hat Enterprise Linux 9.0 Update Services for SAP Solutions
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-30250
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.09% / 25.59%
||
7 Day CHG~0.00%
Published-04 Apr, 2024 | 14:57
Updated-02 Aug, 2024 | 01:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
In Astro-Shield, setting a correct `integrity` attribute to injected code allows to bypass the allow-lists

Astro-Shield is an integration to enhance website security with SubResource Integrity hashes, Content-Security-Policy headers, and other techniques. Versions from 1.2.0 to 1.3.1 of Astro-Shield allow bypass to the allow-lists for cross-origin resources by introducing valid `integrity` attributes to the injected code. This implies that the injected SRI hash would be added to the generated CSP header, which would lead the browser to believe that the injected resource is legit. This vulnerability is patched in version 1.3.2.

Action-Not Available
Vendor-kindspellskindspells
Product-astro-shieldastro-shield
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2023-23941
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.35%
||
7 Day CHG~0.00%
Published-03 Feb, 2023 | 20:26
Updated-10 Mar, 2025 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SwagPayPal payment not sent to PayPal correctly

SwagPayPal is a PayPal integration for shopware/platform. If JavaScript-based PayPal checkout methods are used (PayPal Plus, Smart Payment Buttons, SEPA, Pay Later, Venmo, Credit card), the amount and item list sent to PayPal may not be identical to the one in the created order. The problem has been fixed with version 5.4.4. As a workaround, disable the aforementioned payment methods or use the Security Plugin in version >= 1.0.21.

Action-Not Available
Vendor-shopwareshopware
Product-swagpaypalSwagPayPal
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2021-46559
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.11% / 30.56%
||
7 Day CHG~0.00%
Published-26 Jan, 2022 | 01:11
Updated-04 Aug, 2024 | 05:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The firmware on Moxa TN-5900 devices through 3.1 has a weak algorithm that allows an attacker to defeat an inspection mechanism for integrity protection.

Action-Not Available
Vendor-n/aMoxa Inc.
Product-tn-5900_firmwaretn-5900n/a
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2020-26547
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.21% / 43.12%
||
7 Day CHG~0.00%
Published-01 Feb, 2021 | 01:02
Updated-04 Aug, 2024 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Monal before 4.9 does not implement proper sender verification on MAM and Message Carbon (XEP-0280) results. This allows a remote attacker (able to send stanzas to a victim) to inject arbitrary messages into the local history, with full control over the sender and receiver displayed to the victim.

Action-Not Available
Vendor-monaln/a
Product-monaln/a
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2020-25019
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.08%
||
7 Day CHG~0.00%
Published-29 Aug, 2020 | 16:07
Updated-04 Aug, 2024 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

jitsi-meet-electron (aka Jitsi Meet Electron) before 2.3.0 calls the Electron shell.openExternal function without verifying that the URL is for an http or https resource, in some circumstances.

Action-Not Available
Vendor-jitsin/a
Product-meet_electronn/a
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2020-13265
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.12% / 30.97%
||
7 Day CHG~0.00%
Published-19 Jun, 2020 | 21:42
Updated-04 Aug, 2024 | 12:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

User email verification bypass in GitLab CE/EE 12.5 and later through 13.0.1 allows user to bypass email verification

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-33687
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.76%
||
7 Day CHG~0.00%
Published-24 Jun, 2024 | 15:03
Updated-13 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient verification of data authenticity issue exists in NJ Series CPU Unit all versions and NX Series CPU Unit all versions. If a user program in the affected product is altered, the product may not be able to detect the alteration.

Action-Not Available
Vendor-omronOMRON Corporation
Product-nx1p2-1040dt1_firmwarenx1p2-9024dt1_firmwarenx102-1100_firmwarenj501-4300_firmwarenj101-1020nx701-1600_firmwarenx102-1020_firmwarenj501-4300nj501-5300-1nj-pd3001nx1w-mab221nj501-1320_firmwarenx1p2-1040dt_firmwarenj501-5300_firmwarenj501-1340nx701-z700_firmwarenj501-4310_firmwarenx1w-mab221_firmwarenx701-1600nj501-r420nj101-9000nx102-9000_firmwarenj101-1000nx102-1120nj501-4500nx1p2-9024dtnx102-1020nj-pa3001nj501-4400_firmwarenj501-1300_firmwarenx1p2-1040dt1nj501-4400nj101-1020_firmwarenx701-z700nx701-1700_firmwarenj501-1320nx1p2-9024dt_firmwarenj501-5300-1_firmwarenj501-4310nj101-9000_firmwarenx1p2-1040dtnj501-1400nx102-1100nj101-9020nx1w-adb21nj501-r520nj501-r400_firmwarenj-pa3001_firmwarenj501-r400nj501-1340_firmwarenj101-1000_firmwarenx1p2-1140dt1nj501-r320nj-pd3001_firmwarenj501-4500_firmwarenx1p2-9024dt1nx701-1720_firmwarenx102-1220_firmwarenx102-1200nj501-r320_firmwarenx1w-cif01nx102-1000_firmwarenx102-9020_firmwarenj501-5300nj501-1500nx1w-dab21v_firmwarenx1w-adb21_firmwarenx701-1700nj501-140nx102-1220nj301-1100_firmwarenx701-1720nj501-r300_firmwarenx102-1000nj501-1520_firmwarenx1w-cif11_firmwarenj301-1200nx1w-cif01_firmwarenj501-r520_firmwarenj101-9020_firmwarenj501-r300nj301-1100nj501-4320nx102-9020nx102-1120_firmwarenj501-r500_firmwarenx1w-cif12nx1p2-1140dt_firmwarenx1p2-1140dt1_firmwarenx1w-cif11nx1w-cif12_firmwarenj501-1300nj501-r500nx701-1620nx701-z600_firmwarenj501-1520nx701-z600nx102-9000nj501-4320_firmwarenx701-1620_firmwarenj501-1500_firmwarenx1w-dab21vnj301-1200_firmwarenx102-1200_firmwarenj501-r420_firmwarenj501-1400_firmwarenj501-1420nx1p2-1140dtnj501-140_firmwarenj501-1420_firmwareNX Series CPU UnitNJ Series CPU Unit
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
  • Previous
  • 1
  • 2
  • Next
Details not found