### [CVE-2020-12244](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12244) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation. ### POC #### Reference - https://hackerone.com/reports/858854 - https://hackerone.com/reports/858854 #### Github No PoCs found on GitHub currently.