CVE-2025-30192
Linux Debian vulnerability analysis and mitigation

Overview

A security vulnerability (CVE-2025-30192) was discovered in PowerDNS Recursor affecting versions up to and including 5.0.10, 5.1.4, and 5.2.2, specifically when outgoing ECS (EDNS Client Subnet) is enabled. The vulnerability was disclosed on July 21, 2025, and was identified by Xiang Li of AOSP Lab Nankai University (PowerDNS Advisory).

Technical details

The vulnerability relates to insufficient verification of data authenticity (CWE-345) in PowerDNS Recursor's handling of ECS-enabled queries. When the system is configured to send out ECS-enabled queries, it becomes more susceptible to spoofing attempts compared to non-ECS enabled queries. The vulnerability has received a CVSS v3.1 base score of 7.5 (High), with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (PowerDNS Advisory).

Impact

The primary impact of this vulnerability is cache pollution, which can occur when an attacker successfully spoofs answers to ECS-enabled requests. The vulnerability affects the availability of the DNS service, though there is no risk of system compromise (PowerDNS Advisory).

Mitigation and workarounds

The vulnerability has been patched in PowerDNS Recursor versions 5.0.12, 5.1.6, and 5.2.4. Organizations can either upgrade to these patched versions or disable outgoing ECS, which is the default configuration. The updated versions include various mitigations against spoofing attempts of ECS-enabled queries by implementing chain validation and enforcing stricter validation of received answers. Additional protection is available through the new setting 'outgoing.edns_subnet_harden' (or legacy name 'edns-subnet-harden') (PowerDNS Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22857MEDIUM6.8
  • Linux DebianLinux Debian
  • freerdp-plugins
NoNoJan 14, 2026
CVE-2026-22856MEDIUM6.8
  • Linux DebianLinux Debian
  • freerdp2
NoNoJan 14, 2026
CVE-2026-22859MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 14, 2026
CVE-2026-22858MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 14, 2026
CVE-2026-22036LOW3.7
  • JavaScriptJavaScript
  • node-undici
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management