CVE-2025-30192

7.5 HIGH

📋 TL;DR

This vulnerability in PowerDNS Recursor allows attackers to spoof DNS responses for ECS-enabled queries more effectively than standard queries. It affects PowerDNS Recursor installations using EDNS Client Subnet (ECS) functionality. The vulnerability enables DNS cache poisoning attacks that could redirect users to malicious sites.

💻 Affected Systems

Products:
  • PowerDNS Recursor
Versions: All versions before 4.9.6 and 5.0.3
Operating Systems: All operating systems running PowerDNS Recursor
Default Config Vulnerable: ✅ No
Notes: Only affects configurations using ECS (EDNS Client Subnet) functionality. The vulnerability is more exploitable when ECS is enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Successful DNS cache poisoning leading to widespread traffic redirection to attacker-controlled infrastructure, enabling phishing, malware distribution, or credential theft across all users of the affected DNS resolver.

🟠

Likely Case

Targeted DNS spoofing attacks redirecting specific users or services to malicious sites for phishing or credential harvesting.

🟢

If Mitigated

Minimal impact with proper ECS hardening enabled and updated software, though some spoofing attempts might still succeed with lower probability.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to send spoofed DNS responses and knowledge of ECS query patterns.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.9.6 or 5.0.3

Vendor Advisory: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-04.html

Restart Required: Yes

Instructions:

1. Download PowerDNS Recursor 4.9.6 or 5.0.3 from official repositories. 2. Stop the recursor service. 3. Install the updated package. 4. Enable outgoing.edns_subnet_harden setting. 5. Restart the recursor service.

🔧 Temporary Workarounds

Enable ECS Subnet Hardening

all

Enable the outgoing.edns_subnet_harden setting to enforce stricter validation of ECS responses

rec_control set outgoing.edns_subnet_harden true

Disable ECS Functionality

all

Temporarily disable EDNS Client Subnet support if not required

rec_control set edns-subnet-whitelist ""

🧯 If You Can't Patch

  • Enable outgoing.edns_subnet_harden setting immediately
  • Implement DNS response validation at network perimeter

🔍 How to Verify

Check if Vulnerable:

Check PowerDNS Recursor version and ECS configuration: pdns_recursor --version and check recursor.conf for ECS settings

Check Version:

pdns_recursor --version | grep Version

Verify Fix Applied:

Verify version is 4.9.6/5.0.3 or higher and outgoing.edns_subnet_harden is enabled

📡 Detection & Monitoring

Log Indicators:

  • Unusual DNS response patterns
  • Multiple failed ECS query validations
  • Suspicious source IPs in DNS queries

Network Indicators:

  • Unexpected DNS response traffic patterns
  • Spoofed DNS responses to ECS queries

SIEM Query:

source="pdns_recursor" AND (message="validation failed" OR message="ECS spoofing attempt")

🔗 References

📤 Share & Export