Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-30192

Опубликовано: 21 июл. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.

РелизСтатусПримечание
devel

needs-triage

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-apps/xenial

needs-triage

jammy

needs-triage

noble

needs-triage

plucky

needs-triage

questing

needs-triage

Показывать по

EPSS

Процентиль: 9%
0.00033
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
6 месяцев назад

An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.

CVSS3: 7.5
debian
6 месяцев назад

An attacker spoofing answers to ECS enabled requests sent out by the R ...

CVSS3: 7.5
github
6 месяцев назад

An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.

CVSS3: 7.5
fstec
6 месяцев назад

Уязвимость DNS-сервера PowerDNS Recursor, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю проводить спуфинг-атаки

CVSS3: 7.5
redos
3 месяца назад

Уязвимость pdns-recursor

EPSS

Процентиль: 9%
0.00033
Низкий

7.5 High

CVSS3