Home

Description

NLnet Labs Unbound 1.16.2 up to and including version 1.25.0 has a vulnerability of the 'ghost domain names' family of attacks that could extend the ghost domain window by up to one cached TTL configured value. Similar to other 'ghost domain names' attacks, an adversary needs to control a (ghost) zone and be able to query a vulnerable Unbound. A single client NS query can cause Unbound to overwrite the cached expired parent-side referral NS rrset with the child-side apex NS rrset and essentially extend the ghost domain window by up to one cached TTL configured value ('cache-max-ttl'). In configurations where 'harden-referral-path: yes' is used (non-default configuration), no client NS query is required since Unbound implicitly performs that query. Unbound 1.25.1 contains a patch with a fix that does not allow extension of TTLs for (parent) NS records regardless of their trust.

PUBLISHED Reserved 2026-05-07 | Published 2026-05-20 | Updated 2026-05-20 | Assigner NLnet Labs




MEDIUM: 6.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber

Product status

Default status
unaffected

1.16.2 (semver) before 1.25.1
affected

Timeline

2026-04-28:Issue reported by Qifan Zhang
2026-05-07:NLnet Labs shares patch
2026-05-08:Qifan Zhang verifies patch
2026-05-20:Fixes released with version 1.25.1

Credits

Qifan Zhang (Palo Alto Networks) finder

References

www.nlnetlabs.nl/downloads/unbound/CVE-2026-40622.txt vendor-advisory

cve.org (CVE-2026-40622)

nvd.nist.gov (CVE-2026-40622)

Download JSON