A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt |
Configurations
No configuration.
History
17 Jul 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
16 Jul 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-16 15:15
Updated : 2025-07-17 21:15
NVD link : CVE-2025-5994
Mitre link : CVE-2025-5994
CVE.ORG link : CVE-2025-5994
JSON object : View
Products Affected
No product.
CWE
CWE-349
Acceptance of Extraneous Untrusted Data With Trusted Data