CVE-2025-59023
Cache Poisoning Vulnerability in Recursor via Crafted Delegations
Publication date: 2026-02-09
Last updated on: 2026-04-20
Assigner: Open-Xchange
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| powerdns | recursor | From 5.1.0 (inc) to 5.1.8 (exc) |
| powerdns | recursor | From 5.2.0 (inc) to 5.2.6 (exc) |
| powerdns | recursor | From 5.3.0 (inc) to 5.3.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-294 | A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves crafted delegations or IP fragments that can poison cached delegations in a Recursor. Essentially, an attacker can manipulate the cached DNS delegation information used by the Recursor, potentially causing it to use incorrect or malicious data.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing an attacker to poison the cached delegations in the Recursor, which may lead to incorrect resolution of domain names. This can result in denial of service or redirection of traffic to malicious sites, impacting the integrity and availability of services.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know