HIGH
The attack vector involves the exploitation of .arpa domain and IPv6 addresses, making it highly exploitable in real-world scenarios due to the difficulty in detection. There are no specific patches available as this is a misuse of existing protocols rather than a vulnerability.

Cybercriminals are exploiting the .arpa domain and IPv6 addresses for phishing attacks, potentially affecting anyone who accesses these domains. Attackers can host malicious websites that are difficult to detect with traditional security measures.

Affected Systems
  • All systems accessing .arpa domains over IPv6
Remediation
  • Update DNS resolution policies to avoid resolving to .arpa domain for non-intended purposes.
  • Implement strict firewall rules to block or monitor traffic to known malicious IP addresses.
  • Use security software that can detect and mitigate phishing attempts over IPv6.
Stack Impact

This issue may affect all services using DNS resolution, including nginx, docker, linux kernel, openssh, curl, openssl, python, and homelab components depending on their configuration.

Source →