When an incoming DNS protocol message includes a Transaction Signature (TSIG), BIND always checks it. If the TSIG contains an invalid value in the algorithm field, BIND immediately aborts with an assertion failure.This issue affects BIND 9 versions 9.20.0 through 9.20.8 and 9.21.0 through 9.21.7.
No PoCs from references.
- https://github.com/AlexSvobo/nhi-zero-trust-bypass
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/runwhen-contrib/helm-charts