CVE-2025-50334
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-08

Last updated on: 2026-01-12

Assigner: MITRE

Description
An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a denial of service via the rate-limiting component
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-08
Last Modified
2026-01-12
Generated
2026-05-07
AI Q&A
2026-01-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
technitium dnsserver to 14.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Technitium DNS Server version 13.5 allows a remote attacker to cause a denial of service (DoS) by exploiting the rate-limiting component of the server.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing a remote attacker to disrupt the normal operation of the Technitium DNS Server, causing it to become unavailable or unresponsive due to a denial of service condition.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Technitium DNS Server to the latest version that includes the fix for CVE-2025-50334. This update introduces improved UDP socket pool configuration and enhanced error handling during DNS-over-HTTPS startup to prevent denial of service via the rate-limiting component. Applying this update will improve stability and reduce the risk of exploitation. [4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart