Impact
The flaw involves insufficient validation of member zone data in PowerDNS Authoritative servers, which can trigger a failure during catalog zone transfers. When a zone transfer is attempted, the server may reject or abort the operation, effectively preventing clients from obtaining updated DNS zone information. This disruption does not compromise data confidentiality or integrity but can interrupt service availability for any client relying on timely zone transfers.
Affected Systems
All installations of the PowerDNS Authoritative server are potentially impacted. No specific affected versions are listed, so any deployment of the PowerDNS authoritative component should be considered at risk until a patch is applied.
Risk and Exploitability
With a CVSS score of 4.9 the risk is moderate. The EPSS score is less than 1%, and the vulnerability is not listed in CISA KEV, indicating no widely documented exploitation. The attack vector is inferred to be remote, via normal DNS traffic, since any client can initiate a catalog transfer. Exploitation would result in denial of zone transfer and degraded DNS service rather than credential compromise or data theft.
OpenCVE Enrichment
Debian DSA