Impact
A weakness in Technitium DNS Server permits DNS traffic amplification by exploiting cyclic name server delegation loops. The flaw enables an attacker to send specially crafted queries that trigger a chain of recursive delegations, producing excessive DNS responses that can overwhelm the network. Classified as CWE-684, an application‑logic weakness, the vulnerability leads to improper handling of DNS delegation paths and can create denial‑of‑service conditions.
Affected Systems
Technitium DNS Server versions earlier than 15.0 are affected. Any installation that has not been upgraded to 15.0 or newer is susceptible.
Risk and Exploitability
The CVSS score of 7.2 indicates a high severity, while the EPSS score of less than 1 % suggests that exploitation is currently unlikely. The likely attack vector is network‑based; based on the description, it is inferred that an external actor can send crafted DNS requests that trigger the amplification loop, potentially overwhelming the target with traffic. No local privileges or authentication are required.
OpenCVE Enrichment