nic CVE Vulnerabilities & Metrics

Focus on nic vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About nic Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with nic. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total nic CVEs: 16
Earliest CVE date: 22 Jan 2018, 18:29 UTC
Latest CVE date: 14 Feb 2024, 16:15 UTC

Latest CVE reference: CVE-2023-50387

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical nic CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.51

Max CVSS: 5.0

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 5
4.0-6.9 11
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS nic CVEs

These are the five CVEs with the highest CVSS scores for nic, sorted by severity first and recency.

All CVEs for nic

CVE-2023-50387 nic vulnerability CVSS: 0 14 Feb 2024, 16:15 UTC

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.

CVE-2023-46317 nic vulnerability CVSS: 0 22 Oct 2023, 23:15 UTC

Knot Resolver before 5.7.0 performs many TCP reconnections upon receiving certain nonsensical responses from servers.

CVE-2023-26249 nic vulnerability CVSS: 0 21 Feb 2023, 02:15 UTC

Knot Resolver before 5.6.0 enables attackers to consume its resources, launching amplification attacks and potentially causing a denial of service. Specifically, a single client query may lead to a hundred TCP connection attempts if a DNS server closes connections without providing a response.

CVE-2022-40188 nic vulnerability CVSS: 0 23 Sep 2022, 16:15 UTC

Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets.

CVE-2022-32983 nic vulnerability CVSS: 5.0 20 Jun 2022, 16:15 UTC

Knot Resolver through 5.5.1 may allow DNS cache poisoning when there is an attempt to limit forwarding actions by filters.

CVE-2021-40083 nic vulnerability CVSS: 5.0 25 Aug 2021, 01:15 UTC

Knot Resolver before 5.3.2 is prone to an assertion failure, triggerable by a remote attacker in an edge case (NSEC3 with too many iterations used for a positive wildcard proof).

CVE-2021-26928 nic vulnerability CVSS: 4.9 04 Jun 2021, 21:15 UTC

BIRD through 2.0.7 does not provide functionality for password authentication of BGP peers. Because of this, products that use BIRD (which may, for example, include Tigera products in some configurations, as well as products of other vendors) may have been susceptible to route redirection for Denial of Service and/or Information Disclosure. NOTE: a researcher has asserted that the behavior is within Tigera’s area of responsibility; however, Tigera disagrees

CVE-2018-1110 nic vulnerability CVSS: 5.0 30 Mar 2021, 02:15 UTC

A flaw was found in knot-resolver before version 2.3.0. Malformed DNS messages may cause denial of service.

CVE-2020-12667 nic vulnerability CVSS: 5.0 19 May 2020, 13:15 UTC

Knot Resolver before 5.1.1 allows traffic amplification via a crafted DNS answer from an attacker-controlled server, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.

CVE-2019-19331 nic vulnerability CVSS: 5.0 16 Dec 2019, 16:15 UTC

knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB).

CVE-2013-5661 nic vulnerability CVSS: 2.6 05 Nov 2019, 19:15 UTC

Cache Poisoning issue exists in DNS Response Rate Limiting.

CVE-2019-16159 nic vulnerability CVSS: 5.0 09 Sep 2019, 15:15 UTC

BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a stack-based buffer overflow. The BGP daemon's support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.

CVE-2019-10191 nic vulnerability CVSS: 5.0 16 Jul 2019, 18:15 UTC

A vulnerability was discovered in DNS resolver of knot resolver before version 4.1.0 which allows remote attackers to downgrade DNSSEC-secure domains to DNSSEC-insecure state, opening possibility of domain hijack using attacks against insecure DNS protocol.

CVE-2019-10190 nic vulnerability CVSS: 5.0 16 Jul 2019, 18:15 UTC

A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 before 4.1.0 which allows remote attackers to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation failed, instead of sending a SERVFAIL packet. Caching is not affected by this particular bug but see CVE-2019-10191.

CVE-2018-10920 nic vulnerability CVSS: 4.3 02 Aug 2018, 13:29 UTC

Improper input validation bug in DNS resolver component of Knot Resolver before 2.4.1 allows remote attacker to poison cache.

CVE-2018-1000002 nic vulnerability CVSS: 4.3 22 Jan 2018, 18:29 UTC

Improper input validation bugs in DNSSEC validators components in Knot Resolver (prior version 1.5.2) allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay.