CVE-2026-43617
Undergoing Analysis Undergoing Analysis - In Progress
Authorization Bypass in Rsync via PTR Record Spoofing

Publication date: 2026-05-20

Last updated on: 2026-05-20

Assigner: VulnCheck

Description
Rsync version 3.4.2 and prior contain an authorization bypass vulnerability in the rsync daemon's hostname-based access control list enforcement when configured with chroot. Attackers can bypass hostname-based deny rules by controlling the PTR record for their source IP address, allowing connections from hostnames that administrators intended to deny when reverse DNS resolution fails and defaults to UNKNOWN.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-20
Last Modified
2026-05-20
Generated
2026-05-20
AI Q&A
2026-05-20
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-289 The product performs authentication based on the name of a resource being accessed, or the name of the actor performing the access, but it does not properly check all possible names for that resource or actor.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of CVE-2026-43617 on compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

CVE-2026-43617 is an authorization bypass vulnerability in rsync versions 3.4.2 and earlier when the rsync daemon is configured with chroot and uses hostname-based access control lists (ACLs).

The vulnerability occurs because reverse DNS lookups are performed inside the chroot environment, which often lacks necessary files for DNS resolution. When the reverse DNS lookup fails, the hostname defaults to "UNKNOWN."

Attackers who control the PTR record for their source IP address can exploit this by causing their hostname to be resolved as "UNKNOWN," thereby bypassing hostname-based deny rules intended to block them.

This means that hostnames administrators intended to deny can be circumvented, allowing unauthorized connections.


How can this vulnerability impact me? :

This vulnerability can allow unauthorized users to bypass hostname-based access restrictions on rsync daemons configured with chroot.

Attackers can gain access from hostnames that were meant to be denied, potentially exposing sensitive files or data shared via rsync.

However, IP-based access control lists are not affected by this vulnerability, so relying on IP-based restrictions can mitigate the risk.

The impact depends on how critical the rsync service is and how strictly hostname-based ACLs are used for security.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves bypassing hostname-based deny rules by manipulating the PTR record of the source IP address, which affects reverse DNS resolution when rsync is configured with chroot.

To detect this vulnerability on your system, you can check if your rsync daemon is running a version prior to 3.4.3 and if it is configured with chroot and hostname-based access control lists.

You can verify the rsync version with the command:

  • rsync --version

To check if the rsync daemon is running with chroot and hostname-based ACLs, review the rsync daemon configuration file (usually /etc/rsyncd.conf) for settings like 'use chroot = yes' and 'hosts deny' or 'hosts allow' directives.

To detect if reverse DNS resolution is failing inside the chroot, you can test DNS resolution within the chroot environment by attempting to resolve hostnames or checking for the presence of necessary DNS files such as /etc/resolv.conf.

Network commands to check reverse DNS for connecting IPs include:

  • dig -x <client-ip>
  • host <client-ip>

Monitoring rsync logs for connections from hostnames labeled as 'UNKNOWN' or unexpected hostnames can also help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade rsync to version 3.4.3 or later, where this vulnerability is fixed.

If upgrading immediately is not possible, you can apply the following workarounds:

  • Use IP-based access control lists (ACLs) instead of hostname-based ACLs, as IP-based ACLs are not affected by this vulnerability.
  • Ensure that the chroot environment used by the rsync daemon contains the necessary DNS resolution files such as /etc/resolv.conf, /etc/nsswitch.conf, /etc/hosts, and NSS service modules to allow proper reverse DNS lookups.

Additionally, monitor your rsync logs for suspicious connections from hostnames resolving to 'UNKNOWN' or unexpected hostnames.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart