Description
Incorrect Behaviour of Views with TCP PROXY Requests
Published: 2026-05-21
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises when PowerDNS authoritative fails to correctly process TCP PROXY requests within multiple views. This flawed behavior can cause the DNS server to return incorrect view results, potentially exposing data that should be scoped to a specific view. The impact consists primarily of unintended information disclosure to a client that is able to send TCP PROXY headers, upsetting the intended separation of view data. This weakness is represented by CWE‑200 and CWE‑284, indicating inadequate access control and information exposure.

Affected Systems

PowerDNS Authoritative servers may be affected. The advisory does not list specific vulnerable versions, so all instances of the product that process TCP PROXY requests should be checked and remedied. The vendor’s documentation and advisory page provide further guidance on affected releases.

Risk and Exploitability

The CVSS score for this issue is 4.8, indicating a moderate severity. EPSS information is not available, and the vulnerability is not indexed in CISA’s KEV catalog, suggesting that there is currently no widely known exploitation. Nonetheless, because the flaw permits incorrect view selection, an attacker can potentially gain access to DNS data that should remain isolated. The attack vector is likely a crafted TCP PROXY request sent to the authoritative server, and the described failure indicates that authentication or view gating checks are bypassed. Security teams should treat this as a moderate risk and implement available mitigations promptly.

Generated by OpenCVE AI on May 21, 2026 at 11:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest version of PowerDNS Authoritative as released in the vendor advisory
  • Disable or restrict the handling of TCP PROXY requests if they are not required for your deployment
  • Configure network firewalls or host-based controls to block unexpected TCP PROXY traffic from untrusted sources

Generated by OpenCVE AI on May 21, 2026 at 11:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Powerdns
Powerdns authoritative
Weaknesses CWE-200
CWE-284
Vendors & Products Powerdns
Powerdns authoritative

Thu, 21 May 2026 10:15:00 +0000

Type Values Removed Values Added
Description Incorrect Behaviour of Views with TCP PROXY Requests
Title Incorrect Behaviour of Views with TCP PROXY Requests
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Powerdns Authoritative
cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2026-05-21T11:58:25.869Z

Reserved: 2026-04-23T11:15:21.198Z

Link: CVE-2026-41999

cve-icon Vulnrichment

Updated: 2026-05-21T11:58:22.026Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-21T10:16:25.433

Modified: 2026-05-21T15:27:51.530

Link: CVE-2026-41999

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T11:30:06Z

Weaknesses