Impact
The vulnerability allows remote attackers to bypass source checks by sending a crafted DNS packet that includes RFC 7871 client subnet information. This flaw enables the disclosure of client subnet data that should otherwise be protected.
Affected Systems
dnsmasq is affected when it processes DNS queries containing RFC 7871 client subnet options. No specific product versions are listed, so all builds that support RFC 7871 and do not enforce source validation could be vulnerable.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate severity. The EPSS score is 0.00049 (<1%), indicating a low exploitation probability, and the vulnerability is not listed in the CISA KEV catalog, so public exploitation data is limited. Attackers can exploit the flaw remotely by sending crafted DNS packets over the network that contain a client‑subnet option, without requiring local or authenticated access.
OpenCVE Enrichment
Debian DSA