Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33655: n/a

0
High
VulnerabilityCVE-2024-33655cvecve-2024-33655
Published: Thu Jun 06 2024 (06/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.

AI-Powered Analysis

AILast updated: 11/03/2025, 18:46:30 UTC

Technical Analysis

CVE-2024-33655 is a vulnerability affecting the DNS protocol as specified in RFC 1035 and its subsequent updates. The issue arises from the way DNS queries can be accumulated over a period of seconds, causing the DNS server to respond later in a pulsing burst. This behavior can be exploited by remote attackers to induce a denial of service (DoS) condition through resource exhaustion, as the server must handle a sudden surge of outbound DNS responses. This mechanism can also be leveraged for traffic amplification attacks, where the volume of DNS responses significantly exceeds the volume of queries sent by the attacker, potentially overwhelming network resources. The vulnerability is categorized under CWE-400, which relates to uncontrolled resource consumption. The CVSS v3.1 base score of 7.5 reflects a high severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No specific affected software versions are listed, indicating the vulnerability is inherent to the DNS protocol itself rather than a particular implementation. No patches or known exploits have been reported yet, but the potential for disruption is significant given the critical role of DNS in internet infrastructure.

Potential Impact

For European organizations, this vulnerability poses a risk of denial of service against DNS infrastructure, which is foundational for internet and intranet operations. Disruptions could lead to widespread service outages, affecting web services, email, and other critical applications relying on DNS resolution. The amplification aspect could also be exploited to launch larger distributed denial of service (DDoS) attacks against third-party targets, implicating European networks as unwitting participants or victims. Organizations with public-facing DNS servers or those operating recursive resolvers are particularly at risk. The impact extends to ISPs, cloud providers, and enterprises with significant DNS traffic. Given the high reliance on digital services in Europe, such disruptions could affect economic activities, government services, and critical infrastructure. The lack of authentication and user interaction requirements makes the attack feasible for a broad range of threat actors, increasing the threat landscape.

Mitigation Recommendations

Mitigation should focus on DNS server configuration and network-level controls. Operators should implement rate limiting on DNS queries to prevent accumulation and burst responses. Deploying Response Rate Limiting (RRL) on authoritative DNS servers can reduce amplification potential. Monitoring DNS traffic patterns for unusual query accumulation or pulsing bursts is critical to early detection. Network operators should employ anomaly detection systems to identify and block suspicious traffic flows. Where possible, DNS servers should be updated to versions that include protections against such resource exhaustion, or patches should be applied once available. Segmentation of DNS infrastructure and use of Anycast routing can help distribute load and mitigate impact. Additionally, organizations should collaborate with upstream providers and CERTs to share threat intelligence and coordinate responses. Implementing DNS over HTTPS (DoH) or DNS over TLS (DoT) does not directly mitigate this issue but can improve overall DNS security posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-04-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6908f50df612d110fe9cbeaf

Added to database: 11/3/2025, 6:31:41 PM

Last enriched: 11/3/2025, 6:46:30 PM

Last updated: 11/4/2025, 6:18:20 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats