{
  "threat_severity" : "Moderate",
  "public_date" : "2022-12-08T00:00:00Z",
  "bugzilla" : {
    "description" : "systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes",
    "id" : "2222672",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2222672"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.9",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-300",
  "details" : [ "A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.", "A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records." ],
  "statement" : "This CVE is classified as moderate because the attack requires an active Man-in-the-Middle (MITM) who can intercept and modify the connection's traffic at the TCP/IP layer.\nNote that DNSSEC= option is by default set to 'no' and changing the value requires root privileges.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-05-22T00:00:00Z",
    "advisory" : "RHSA-2024:3203",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "systemd-0:239-82.el8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2463",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "systemd-0:252-32.el9_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2463",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "systemd-0:252-32.el9_4"
  } ],
  "package_state" : [ {
    "product_name" : "Cryostat 2",
    "fix_state" : "Not affected",
    "package_name" : "systemd",
    "cpe" : "cpe:/a:redhat:cryostat:2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-7008\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-7008\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2222261\nhttps://github.com/systemd/systemd/issues/25676" ],
  "name" : "CVE-2023-7008",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}