DNS OverDoS Are Private Endpoints Too Private? #249
+103
−84
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Title: DNS OverDoS: Are Private Endpoints Too Private? (Unit 42, published January 20, 2026)
What the post reveals (no CVE): A DNS-driven, configuration-triggered denial-of-service condition in Azure Private Link / Private Endpoints that primarily impacts hybrid architectures (some workloads use public endpoints while others use Private Endpoints). The issue stems from Azure’s forced DNS resolution behavior when a VNET is linked to a se...
🔧 Technical Details
Trick 1 — Forced Private DNS resolution can create an availability kill-switch: In Azure Private Link, if a VNET has a virtual network link to a service-type Private DNS zone (e.g.,
privatelink.blob.core.windows[.]net), Azure DNS logic can force resolution of matching service hostnames through that zone for Private Link registered resources. If the zone lacks the required A record for a target resource, DNS fails and the client never obtains an IP address, producing a DoS even though the public endpoint remains reachable.Trick 2 — Control-plane DoS via RBAC-enabled Private Endpoint + DNS link manipulation: With sufficient Azure RBAC permissions, an attacker (or automation) can create Private Endpoints and/or link Private DNS zones to additional VNETs to impose the “forced resolution” behavior on victim networks. If DNS record coverage is incomplete (no A record for a critical resource), victims ...
🤖 Agent Actions
Summary:
Tests:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.