
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-12200 was initially reported as a vulnerability in dnsmasq up to version 2.73rc6, specifically in the parse_dhcp_opt function of the src/option.c component. However, this CVE was later rejected and withdrawn by its CNA (Certificate Numbering Authority) after further investigation showed that it was not a security issue. The reported conditions were determined to represent expected and intentional behavior within dnsmasq's documented design (NVD).
The initially reported issue was described as a null pointer dereference vulnerability in the Config File Handler component, specifically affecting the parse_dhcp_opt function. The vulnerability was initially assigned various CVSS scores, but these were later removed when the issue was determined not to be a security vulnerability (NVD).
Since the reported issue was determined not to be a security vulnerability, there was no actual security impact. The reported conditions were found to be part of the expected and documented behavior of dnsmasq (NVD).
No mitigations or workarounds were necessary as the reported issue was determined not to be a security vulnerability. The behavior in question was confirmed to be part of dnsmasq's intended design (NVD).
The security community engaged in discussions about the validity of this CVE, with Art Manion requesting VulDB to mark the dnsmasq CVE IDs as disputed. Subsequently, VulDB decided to reject the CVE entirely (Openwall).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."