CVE-2025-50334
BaseFortify
Publication date: 2026-01-08
Last updated on: 2026-01-12
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| technitium | dnsserver | to 14.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Technitium DNS Server version 13.5 allows a remote attacker to cause a denial of service (DoS) by exploiting the rate-limiting component of the server.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing a remote attacker to disrupt the normal operation of the Technitium DNS Server, causing it to become unavailable or unresponsive due to a denial of service condition.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Technitium DNS Server to the latest version that includes the fix for CVE-2025-50334. This update introduces improved UDP socket pool configuration and enhanced error handling during DNS-over-HTTPS startup to prevent denial of service via the rate-limiting component. Applying this update will improve stability and reduce the risk of exploitation. [4]