Improper UDP Port Randomization in Nucleus NET and Nucleus ReadyStart: DNS Cache Poisoning and Spoofing Vulnerability

Improper UDP Port Randomization in Nucleus NET and Nucleus ReadyStart: DNS Cache Poisoning and Spoofing Vulnerability

CVE-2021-27393 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2013.08), Nucleus Source Code (Versions including affected DNS modules). The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving.

Learn more about our Web Application Penetration Testing UK.