Impact
PowerDNS Authoritative does not properly validate autoprimary SOA queries. This weakness can allow an attacker to send crafted requests that are incorrectly treated as legitimate, potentially leading the server to generate invalid or unintended DNS responses. The effect is primarily a disruption of DNS service availability, compromising the integrity of name resolution for affected zones.
Affected Systems
The flaw affects PowerDNS Authoritative instances, but no specific version information is listed. All deployments using the default autoprimary SOA handling in PowerDNS are potentially vulnerable until a fix is applied.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity, while the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote, network-based queries to the DNS server. If exploited, the attacker could induce a denial‑of‑service condition, preventing legitimate domain resolution for clients that rely on the affected PowerDNS server.
OpenCVE Enrichment
Debian DSA