CVE-2026-45557 — Technitium DNS Server aggressively tries to fetch missing
CVE-2026-45557 — Technitium DNS Server aggressively tries to fetch missing RRSIG records or mismatched DNSKEY records. An attacker in control of a domain can cause a vulnerable system to generate excessive network traffic. Fixed in 15.0.
What This Means For You
- If your environment is affected by CWE-405, CWE-406, CWE-770, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-45557 updates and patches.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-45557 | vulnerability | CVE-2026-45557 |
| CWE-405 | weakness | CWE-405 |
| CWE-406 | weakness | CWE-406 |
| CWE-770 | weakness | CWE-770 |
🔎
Turn this CVE into SIEM detection coverage
Generate detection rules for Splunk, Sentinel, QRadar & Elastic — straight from this vulnerability. Use /detect in the Intel Bot.
Open Intel Bot →
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 19, 2026 at 18:16 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.