{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-30192","assignerOrgId":"8ce71d90-2354-404b-a86e-bec2cc4e6981","state":"PUBLISHED","assignerShortName":"OX","dateReserved":"2025-03-18T08:39:46.884Z","datePublished":"2025-07-21T12:49:31.532Z","dateUpdated":"2025-07-21T13:05:35.258Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://repo.powerdns.com/","defaultStatus":"affected","modules":["resolver"],"packageName":"pdns-recursor","product":"Recursor","programFiles":["lwres.cc"],"repo":"https://github.com/PowerDNS/pdns","vendor":"PowerDNS","versions":[{"status":"unaffected","version":"5.0.12","versionType":"semver"},{"status":"unaffected","version":"5.1.6","versionType":"semver"},{"status":"unaffected","version":"5.2.4","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Xiang Li of AOSP Lab Nankai University"}],"datePublic":"2025-05-21T14:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries.</p><p>The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers.</p><p>The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.</p>"}],"value":"An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries.\n\nThe updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers.\n\nThe most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-345","description":"CWE-345 Insufficient Verification of Data Authenticity","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8ce71d90-2354-404b-a86e-bec2cc4e6981","shortName":"OX","dateUpdated":"2025-07-21T12:49:31.532Z"},"references":[{"url":"https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-04.html"}],"source":{"advisory":"PowerDNS Security Advisory 2025-04","discovery":"EXTERNAL"},"title":"A Recursor configured to send out ECS enabled queries can be sensitive to spoofing attempts","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-21T13:05:23.317665Z","id":"CVE-2025-30192","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-21T13:05:35.258Z"}}]}}