Powerdns Recursor vulnerabilities
44 known vulnerabilities affecting powerdns/recursor.
Total CVEs
44
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH23MEDIUM18LOW1
Vulnerabilities
Page 1 of 3
CVE-2025-59023HIGHCVSS 8.2≥ 5.3.0, < 5.3.1≥ 5.2.0, < 5.2.6+1 more2026-02-09
CVE-2025-59023 [HIGH] CVE-2025-59023: Crafted delegations or IP fragments can poison cached delegations in Recursor.
Crafted delegations or IP fragments can poison cached delegations in Recursor.
cvelistv5nvd
CVE-2026-24027MEDIUMCVSS 5.3≥ 5.3.0, < 5.3.5≥ 5.2.0, < 5.2.8+1 more2026-02-09
CVE-2026-24027 [MEDIUM] CVE-2026-24027: Crafted zones can lead to increased incoming network traffic.
Crafted zones can lead to increased incoming network traffic.
cvelistv5nvd
CVE-2025-59024MEDIUMCVSS 6.5≥ 5.3.0, < 5.3.1≥ 5.2.0, < 5.2.6+1 more2026-02-09
CVE-2025-59024 [MEDIUM] CVE-2025-59024: Crafted delegations or IP fragments can poison cached delegations in Recursor.
Crafted delegations or IP fragments can poison cached delegations in Recursor.
cvelistv5nvd
CVE-2026-0398MEDIUMCVSS 5.3≥ 5.3.0, < 5.3.5≥ 5.2.0, < 5.2.8+1 more2026-02-09
CVE-2026-0398 [MEDIUM] CWE-770 CVE-2026-0398: Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poison
Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoning in Recursor.
cvelistv5nvd
CVE-2025-59030HIGHCVSS 7.5≥ 5.1.0, < 5.1.9≥ 5.2.0, < 5.2.7+1 more2025-12-09
CVE-2025-59030 [HIGH] CWE-276 CVE-2025-59030: An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP.
An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP.
cvelistv5nvd
CVE-2025-59029MEDIUMCVSS 5.3v5.3.0v5.3.1+1 more2025-12-09
CVE-2025-59029 [MEDIUM] CWE-617 CVE-2025-59029: An attacker can trigger an assertion failure by requesting crafted DNS records, waiting for them to
An attacker can trigger an assertion failure by requesting crafted DNS records, waiting for them to be inserted into the records cache, then send a query with qtype set to ANY.
cvelistv5nvd
CVE-2025-30195HIGHCVSS 7.5v5.2.02025-04-07
CVE-2025-30195 [HIGH] CWE-476 CVE-2025-30195: An attacker can publish a zone containing specific Resource Record Sets. Processing and caching resu
An attacker can publish a zone containing specific Resource Record Sets. Processing and caching results for these sets can lead to an illegal memory accesses and crash of the Recursor, causing a denial of service.
The remedy is: upgrade to the patched 5.2.1 version.
We would like to thank Volodymyr Ilyin for bringing this issue to our attention.
cvelistv5nvd
CVE-2024-25590HIGHCVSS 7.5fixed in 4.9.9≥ 5.0.0, < 5.0.9+1 more2024-10-03
CVE-2024-25590 [HIGH] CWE-20 CVE-2024-25590: An attacker can publish a zone containing specific Resource Record Sets.
Repeatedly processing and
An attacker can publish a zone containing specific Resource Record Sets.
Repeatedly processing and caching results for these sets can lead to a
denial of service.
cvelistv5nvd
CVE-2024-25583HIGHCVSS 7.5v4.8.7v4.9.4+1 more2024-04-25
CVE-2024-25583 [HIGH] CWE-20 CVE-2024-25583: A crafted response from an upstream server the recursor has been configured to forward-recurse to ca
A crafted response from an upstream server the recursor has been configured to forward-recurse to can cause a Denial of Service in the Recursor. The default configuration of the Recursor does not use recursive forwarding and is not affected.
cvelistv5nvd
CVE-2023-50387HIGHCVSS 7.5≥ 4.8.0, < 4.8.6≥ 4.9.0, < 4.9.3+1 more2024-02-14
CVE-2023-50387 [HIGH] CWE-770 CVE-2023-50387: Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow r
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an al
nvd
CVE-2023-50868HIGHCVSS 7.5fixed in 4.8.5≥ 4.9.0, < 4.9.3+1 more2024-02-14
CVE-2023-50868 [HIGH] CWE-400 CVE-2023-50868: The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iter
nvd
CVE-2023-26437MEDIUMCVSS 5.3fixed in 4.6.6≥ 4.7.0, < 4.7.5+2 more2023-04-04
CVE-2023-26437 [MEDIUM] CWE-400 CVE-2023-26437: Denial of service vulnerability in PowerDNS Recursor allows authoritative servers to be marked unava
Denial of service vulnerability in PowerDNS Recursor allows authoritative servers to be marked unavailable.This issue affects Recursor: through 4.6.5, through 4.7.4 , through 4.8.3.
cvelistv5nvd
CVE-2023-22617HIGHCVSS 7.5v4.8.02023-01-21
CVE-2023-22617 [HIGH] CWE-674 CVE-2023-22617: A remote attacker might be able to cause infinite recursion in PowerDNS Recursor 4.8.0 via a DNS que
A remote attacker might be able to cause infinite recursion in PowerDNS Recursor 4.8.0 via a DNS query that retrieves DS records for a misconfigured domain, because QName minimization is used in QM fallback mode. This is fixed in 4.8.1.
nvd
CVE-2022-37428MEDIUMCVSS 6.5≥ 4.5.0, < 4.5.10≥ 4.6.0, < 4.6.3+1 more2022-08-23
CVE-2022-37428 [MEDIUM] CWE-459 CVE-2022-37428: PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has
PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties.
nvd
CVE-2022-27227HIGHCVSS 7.5fixed in 4.4.8≥ 4.5.0, < 4.5.8+1 more2022-03-25
CVE-2022-27227 [HIGH] CVE-2022-27227: In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerD
In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers.
nvd
CVE-2020-25829HIGHCVSS 7.5fixed in 4.1.18≥ 4.2.0, < 4.2.5+1 more2020-10-16
CVE-2020-25829 [HIGH] CVE-2020-25829: An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3
An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (
nvd
CVE-2020-14196MEDIUMCVSS 5.3≤ 4.1.16≥ 4.2.0, ≤ 4.2.2+1 more2020-07-01
CVE-2020-14196 [MEDIUM] CWE-863 CVE-2020-14196: In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting acces
In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced.
nvd
CVE-2020-10030HIGHCVSS 8.8≥ 4.1.0, ≤ 4.3.02020-05-19
CVE-2020-10030 [HIGH] CWE-125 CVE-2020-10030: An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker
An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker (with enough privileges to change the system's hostname) to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does not have '\0' termination of the returned string if the
nvd
CVE-2020-12244HIGHCVSS 7.5≥ 4.1.0, ≤ 4.3.02020-05-19
CVE-2020-12244 [HIGH] CWE-347 CVE-2020-12244: An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section
An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.
nvd
CVE-2020-10995HIGHCVSS 7.5≥ 4.1.0, ≤ 4.3.02020-05-19
CVE-2020-10995 [HIGH] CWE-400 CVE-2020-10995: PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplific
PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the result
nvd
1 / 3Next →