Description
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
INFO
Published Date :
2025-07-21T12:49:31.532Z
Last Modified :
2025-07-21T13:05:35.258Z
Source :
OX
AFFECTED PRODUCTS
The following products are affected by CVE-2025-30192 vulnerability.
| Vendors | Products |
|---|---|
| Powerdns |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-30192.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact