PatchSiren cyber security CVE debrief
CVE-2026-45557 Technitium CVE debrief
CVE-2026-45557 is a denial-of-service issue in Technitium DNS Server where the resolver aggressively retries fetching missing RRSIG records or mismatched DNSKEY records. A domain controlled by an attacker can make a vulnerable system generate excessive network traffic. The vendor fix is in version 15.0.
- Vendor
- Technitium
- Product
- DNS Server
- CVSS
- MEDIUM 6.9
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-19
- Original CVE updated
- 2026-05-19
- Advisory published
- 2026-05-19
- Advisory updated
- 2026-05-19
Who should care
Administrators and operators running Technitium DNS Server, especially systems that resolve external or attacker-controlled domains and environments that rely on DNSSEC validation.
Technical summary
According to the supplied NVD description, vulnerable Technitium DNS Server instances over-aggressively attempt to fetch missing RRSIG records or DNSKEY records that do not match. Because the behavior can be triggered by a domain under attacker control, the resolver may repeatedly generate outbound DNS traffic and consume network resources. The issue is scored as medium severity and is fixed in Technitium DNS Server 15.0.
Defensive priority
Medium priority. Patch promptly if you run Technitium DNS Server, especially on resolvers exposed to untrusted DNS queries or high-volume DNSSEC traffic.
Recommended defensive actions
- Upgrade Technitium DNS Server to version 15.0 or later.
- Verify every deployed instance is on the fixed version, including backups, replicas, and container images.
- Monitor for unusual outbound DNS traffic or repeated lookups involving RRSIG and DNSKEY records.
- Review logs for patterns of repeated DNSSEC-related retries that could indicate exposure to this issue.
- If immediate patching is not possible, reduce exposure by limiting untrusted query sources and closely watching resolver resource usage.
Evidence notes
This debrief is based on the supplied NVD record and its reference metadata. The record states that CVE-2026-45557 was published on 2026-05-19, that NVD status was 'Awaiting Analysis' at capture time, and that the issue affects Technitium DNS Server with a fix in 15.0. The supplied corpus did not include the full text of the referenced changelog or CSAF file, so this summary relies on the NVD description and reference pointers only.
Official resources
-
CVE-2026-45557 CVE record
CVE.org
-
CVE-2026-45557 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
9119a7d8-5eab-497f-8521-727c672e3725
-
Source reference
9119a7d8-5eab-497f-8521-727c672e3725
Publicly disclosed in the supplied NVD record on 2026-05-19. The NVD entry was marked 'Awaiting Analysis' when captured. The corpus indicates the issue is fixed in Technitium DNS Server 15.0.