DNS Cache Poisoning Attack
- "DNS Cache poisoning attack" is detected by the ESET Personal firewall
- "Detected ARP cache poisoning attack" is detected by the ESET Personal firewall
- ESET Customer Care directed you to this article to flush your DNS cache and restore the MS Hosts file
For more information about event names in the ESET Personal firewall log, see the following ESET Knowledgebase article:
If the ESET Personal firewall is detecting a threat to your system from DNS cache poisoning, there are two possible solutions to resolve this issue. Please begin with solution 1 and only continue on to solution 2 if the issue is not resolved.
Solution 1: Create an exception for internal IP traffic
In some cases, the ESET Personal firewall will detect internal IP traffic from a network peripheral such as a router or printer as a possible threat. Follow the step-by-step instructions below to determine if a threat is being caused by internal traffic and resolve this issue.
Determine if the IP address detected in the notification is a number that falls within the following range (where "x" is 0-255):
- 172.16.x.x - 172.31.x.x
If the IP address detected is within the safe range listed above, open your Windows ESET product. How do I open my ESET product? Skip to step 4 and continue with solution 1.
If the IP address being detected as a threat is not within the safe range listed above, or there are no network peripherals currently in use on your network, the device being detected by the Personal firewall is located on a public network and could be a threat to your system. See solution 2 to download the ESET DNS-Flush tool and use it to repair any files that may have been damaged by DNS cache poisoning.
Press the F5 key on your keyboard to access the Advanced setup window.
Click Personal Firewall, expand Advanced and then click Edit next to Zones.
Version 8.x: Expand Network → Personal firewall and then click Rules and zones.
In the Zone and rule editor pane, click Setup. Click here for a screenshot.
In the Firewall zones window, select Trusted zone and click Edit.
Version 8.x: Click the Zones tab, select Addresses excluded from active protection (IDS) and then click Edit. Click here for a screenshot.
In the Zone setup window, click Add IPv4 address. Click here for a screenshot.
Type the IP address of the device being incorrectly detected as a threat in the Remote computer address (IPv4, IPv6, range, mask) field.
Version 8.x: Select Single address, and then enter the IP address of the device being incorrectly detected as a threat. Click here for a screenshot.
Click OK three times to exit Advanced setup and save your changes. You should no longer see any messages about attacks coming from an internal IP address that you know to be safe. If you continue to experience this issue, proceed to solution 2 below.
Version 8.x: Click OK four times to exit the Advanced setup tree and save your changes.
Solution 2: Run the DNS Flush tool
You can use the ESET DNS Flush tool to flush your DNS cache . Follow the step-by-step instructions below to download and run the DNS Flush tool:
Download the DNS-Flush.exe tool and save the file to your Desktop.
Once the download is complete, navigate to your Desktop and double-click DNS-Flush.exe (if you are prompted to continue click Yes). The tool will automatically flush and register your DNS cache.
- After your computer restarts, open your ESET product and run a Computer scan. For assistance, refer to the following Knowledgebase articles:
The Computer scan performed in step 4 should complete without detecting an infection. If no threat is detected, you are finished.
If you are still unable to resolve your issue, please contact ESET Customer Care.