We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30192

A Recursor configured to send out ECS enabled queries can be sensitive to spoofing attempts



Description

An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.

Reserved 2025-03-18 | Published 2025-07-21 | Updated 2025-07-21 | Assigner OX


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-345 Insufficient Verification of Data Authenticity

Product status

Default status
affected

5.0.12
unaffected

5.1.6
unaffected

5.2.4
unaffected

Credits

Xiang Li of AOSP Lab Nankai University finder

References

docs.powerdns.com/...visories/powerdns-advisory-2025-04.html

cve.org (CVE-2025-30192)

nvd.nist.gov (CVE-2025-30192)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30192

Support options

Helpdesk Chat, Email, Knowledgebase