Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28450: n/a

0
High
VulnerabilityCVE-2023-28450cvecve-2023-28450
Published: Wed Mar 15 2023 (03/15/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.

AI-Powered Analysis

AILast updated: 11/04/2025, 00:12:37 UTC

Technical Analysis

Dnsmasq is a widely used lightweight DNS forwarder and DHCP server deployed in many network environments, including enterprise and ISP infrastructures. CVE-2023-28450 identifies a vulnerability in Dnsmasq versions prior to 2.90 related to the handling of the Extension Mechanisms for DNS (EDNS0) UDP packet size. The default maximum EDNS0 UDP packet size was set to 4096 bytes, which exceeds the recommended maximum of 1232 bytes established during DNS Flag Day 2020 to improve DNS reliability and reduce fragmentation issues. Oversized UDP packets can lead to fragmentation or packet loss, causing DNS queries to fail or time out, resulting in denial of service conditions. This vulnerability does not compromise the confidentiality or integrity of DNS data but impacts availability by disrupting DNS resolution. The CVSS v3.1 score of 7.5 reflects a high-severity rating due to the network attack vector, no required privileges or user interaction, and the potential to cause service outages. While no known exploits have been reported, the vulnerability is straightforward to exploit remotely by sending DNS queries that trigger oversized UDP responses. This can degrade or interrupt DNS services, which are critical for network operations. The vulnerability affects all deployments using vulnerable Dnsmasq versions with default configurations. Remediation requires upgrading to Dnsmasq 2.90 or later, which corrects the default EDNS0 UDP packet size to 1232 bytes, aligning with DNS Flag Day recommendations. Network administrators should also review DNS traffic patterns and consider implementing rate limiting or filtering to mitigate potential abuse. Given the fundamental role of DNS in internet and intranet communications, this vulnerability poses a significant risk to service availability.

Potential Impact

For European organizations, this vulnerability can lead to DNS service disruptions, impacting internal and external network communications. DNS outages can cause widespread application failures, loss of internet connectivity, and degraded user experience. Critical sectors such as finance, healthcare, telecommunications, and government services that rely heavily on stable DNS infrastructure could face operational interruptions. The disruption of DNS resolution may also affect cloud services and remote work capabilities, which are prevalent in Europe. Since the vulnerability can be exploited remotely without authentication, attackers could launch denial of service attacks against vulnerable DNS servers, potentially amplifying the impact. The availability impact could cascade into broader network outages, affecting business continuity and causing financial and reputational damage. European organizations with complex network environments using Dnsmasq as part of their DNS infrastructure are particularly at risk. Additionally, the vulnerability could be leveraged in multi-stage attacks where DNS disruption is used as a diversion or to degrade defenses.

Mitigation Recommendations

1. Upgrade all Dnsmasq instances to version 2.90 or later, which corrects the default EDNS0 UDP packet size setting to 1232 bytes. 2. Audit network devices and servers to identify any running vulnerable Dnsmasq versions and prioritize patching. 3. Configure DNS servers and firewalls to monitor and limit oversized UDP DNS packets, applying rate limiting to mitigate potential abuse. 4. Implement DNS response size controls and consider fallback to TCP for large DNS responses to avoid fragmentation issues. 5. Regularly monitor DNS traffic for anomalies that may indicate exploitation attempts or denial of service activities. 6. Educate network and security teams about the vulnerability and ensure incident response plans include DNS service disruption scenarios. 7. For critical infrastructure, consider deploying redundant DNS servers with patched software to ensure high availability. 8. Engage with upstream DNS providers and ISPs to ensure they are also protected against this vulnerability to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-03-15T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909262dfe7723195e0b5e7b

Added to database: 11/3/2025, 10:01:17 PM

Last enriched: 11/4/2025, 12:12:37 AM

Last updated: 11/6/2025, 2:13:49 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats