CVE-2025-30192

An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
Configurations

No configuration.

History

21 Jul 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-21 13:15

Updated : 2025-07-22 13:06


NVD link : CVE-2025-30192

Mitre link : CVE-2025-30192

CVE.ORG link : CVE-2025-30192


JSON object : View

Products Affected

No product.

CWE
CWE-345

Insufficient Verification of Data Authenticity