The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers.
The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22089 | An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 22 Jul 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Powerdns
Powerdns recursor |
|
| Vendors & Products |
Powerdns
Powerdns recursor |
Mon, 21 Jul 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 21 Jul 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled. | |
| Title | A Recursor configured to send out ECS enabled queries can be sensitive to spoofing attempts | |
| Weaknesses | CWE-345 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2025-07-21T13:05:35.258Z
Reserved: 2025-03-18T08:39:46.884Z
Link: CVE-2025-30192
Updated: 2025-07-21T13:05:27.588Z
Status : Awaiting Analysis
Published: 2025-07-21T13:15:26.740
Modified: 2025-07-22T13:06:07.260
Link: CVE-2025-30192
No data.
OpenCVE Enrichment
Updated: 2025-07-22T10:01:21Z
EUVD