Description
An attacker can send replies that result in a null pointer dereference, caused by a missing consistency check and leading to a denial of service. Cookies are disabled by default.
Published: 2026-04-22
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

An attacker can send specially crafted replies that cause the PowerDNS Recursor to dereference a null pointer because the system lacks a consistency check. This flaw triggers a denial of service in the affected server. The weakness originates from insufficient validation of cookie reply data, enabling a null pointer dereference that crashes the process.

Affected Systems

The vulnerability affects the PowerDNS Recursor application. Current version information is not provided in the advisory, and affected releases are not specified, so all deployed instances of PowerDNS Recursor that have not been updated per the official advisory may be susceptible.

Risk and Exploitability

The flaw has a CVSS score of 5.9, indicating moderate severity. The EPSS score is not available, so no estimate of exploitation frequency is provided. It is not listed in the CISA KEV catalog. Based on the description, the attack vector is likely network-based, requiring an attacker to send crafted replies to a running Recursor instance. Successful exploitation would result in process termination and denial of service for clients relying on that server.

Generated by OpenCVE AI on April 22, 2026 at 11:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PowerDNS Recursor to the latest patched version as detailed in the official advisory.
  • Verify that cookie handling remains disabled or is correctly configured according to recommended settings.
  • Monitor Recursor logs and system health, and consider rate limiting or firewall rules to mitigate abnormal reply traffic.

Generated by OpenCVE AI on April 22, 2026 at 11:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Powerdns
Powerdns recursor
Weaknesses CWE-20
CWE-476
Vendors & Products Powerdns
Powerdns recursor

Wed, 22 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Description An attacker can send replies that result in a null pointer dereference, caused by a missing consistency check and leading to a denial of service. Cookies are disabled by default.
Title Insufficient validation of cookie reply
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Powerdns Recursor
cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2026-04-22T18:09:44.730Z

Reserved: 2026-03-18T10:06:16.573Z

Link: CVE-2026-33262

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-22T10:16:51.997

Modified: 2026-04-22T21:23:52.620

Link: CVE-2026-33262

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:30:15Z

Weaknesses