Impact
A malicious authoritative DNS server can send a Response Policy Zone (RPZ) record that causes the PowerDNS Recursor to dereference a null pointer. The missing consistency check triggers the crash, taking the recursor process offline and denying all DNS queries that reach the affected instance.
Affected Systems
All installations of PowerDNS Recursor are vulnerable unless the software has been updated to a patched release. No specific version range is provided, so any currently deployed recursor may be impacted.
Risk and Exploitability
The CVSS score of 4.4 indicates moderate severity. EPSS data is not available and the vulnerability is not listed in CISA KEV, suggesting a lower exploitation probability. The likely attack vector is a remote DNS query sent to the recursor that contains a crafted RPZ record from an attacker-controlled authoritative server. Because the flaw results in a crash rather than data compromise, the primary consequence is downtime of the affected DNS service.
OpenCVE Enrichment