CVE-2023-28450: n/a
An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.
AI Analysis
Technical Summary
Dnsmasq is a widely used lightweight DNS forwarder and DHCP server deployed in many network environments, including enterprise and ISP infrastructures. CVE-2023-28450 identifies a vulnerability in Dnsmasq versions prior to 2.90 related to the handling of the Extension Mechanisms for DNS (EDNS0) UDP packet size. The default maximum EDNS0 UDP packet size was set to 4096 bytes, which exceeds the recommended maximum of 1232 bytes established during DNS Flag Day 2020 to improve DNS reliability and reduce fragmentation issues. Oversized UDP packets can lead to fragmentation or packet loss, causing DNS queries to fail or time out, resulting in denial of service conditions. This vulnerability does not compromise the confidentiality or integrity of DNS data but impacts availability by disrupting DNS resolution. The CVSS v3.1 score of 7.5 reflects a high-severity rating due to the network attack vector, no required privileges or user interaction, and the potential to cause service outages. While no known exploits have been reported, the vulnerability is straightforward to exploit remotely by sending DNS queries that trigger oversized UDP responses. This can degrade or interrupt DNS services, which are critical for network operations. The vulnerability affects all deployments using vulnerable Dnsmasq versions with default configurations. Remediation requires upgrading to Dnsmasq 2.90 or later, which corrects the default EDNS0 UDP packet size to 1232 bytes, aligning with DNS Flag Day recommendations. Network administrators should also review DNS traffic patterns and consider implementing rate limiting or filtering to mitigate potential abuse. Given the fundamental role of DNS in internet and intranet communications, this vulnerability poses a significant risk to service availability.
Potential Impact
For European organizations, this vulnerability can lead to DNS service disruptions, impacting internal and external network communications. DNS outages can cause widespread application failures, loss of internet connectivity, and degraded user experience. Critical sectors such as finance, healthcare, telecommunications, and government services that rely heavily on stable DNS infrastructure could face operational interruptions. The disruption of DNS resolution may also affect cloud services and remote work capabilities, which are prevalent in Europe. Since the vulnerability can be exploited remotely without authentication, attackers could launch denial of service attacks against vulnerable DNS servers, potentially amplifying the impact. The availability impact could cascade into broader network outages, affecting business continuity and causing financial and reputational damage. European organizations with complex network environments using Dnsmasq as part of their DNS infrastructure are particularly at risk. Additionally, the vulnerability could be leveraged in multi-stage attacks where DNS disruption is used as a diversion or to degrade defenses.
Mitigation Recommendations
1. Upgrade all Dnsmasq instances to version 2.90 or later, which corrects the default EDNS0 UDP packet size setting to 1232 bytes. 2. Audit network devices and servers to identify any running vulnerable Dnsmasq versions and prioritize patching. 3. Configure DNS servers and firewalls to monitor and limit oversized UDP DNS packets, applying rate limiting to mitigate potential abuse. 4. Implement DNS response size controls and consider fallback to TCP for large DNS responses to avoid fragmentation issues. 5. Regularly monitor DNS traffic for anomalies that may indicate exploitation attempts or denial of service activities. 6. Educate network and security teams about the vulnerability and ensure incident response plans include DNS service disruption scenarios. 7. For critical infrastructure, consider deploying redundant DNS servers with patched software to ensure high availability. 8. Engage with upstream DNS providers and ISPs to ensure they are also protected against this vulnerability to reduce exposure.
Affected Countries
Germany, Netherlands, France, United Kingdom, Sweden, Finland, Belgium, Italy
CVE-2023-28450: n/a
Description
An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.
AI-Powered Analysis
Technical Analysis
Dnsmasq is a widely used lightweight DNS forwarder and DHCP server deployed in many network environments, including enterprise and ISP infrastructures. CVE-2023-28450 identifies a vulnerability in Dnsmasq versions prior to 2.90 related to the handling of the Extension Mechanisms for DNS (EDNS0) UDP packet size. The default maximum EDNS0 UDP packet size was set to 4096 bytes, which exceeds the recommended maximum of 1232 bytes established during DNS Flag Day 2020 to improve DNS reliability and reduce fragmentation issues. Oversized UDP packets can lead to fragmentation or packet loss, causing DNS queries to fail or time out, resulting in denial of service conditions. This vulnerability does not compromise the confidentiality or integrity of DNS data but impacts availability by disrupting DNS resolution. The CVSS v3.1 score of 7.5 reflects a high-severity rating due to the network attack vector, no required privileges or user interaction, and the potential to cause service outages. While no known exploits have been reported, the vulnerability is straightforward to exploit remotely by sending DNS queries that trigger oversized UDP responses. This can degrade or interrupt DNS services, which are critical for network operations. The vulnerability affects all deployments using vulnerable Dnsmasq versions with default configurations. Remediation requires upgrading to Dnsmasq 2.90 or later, which corrects the default EDNS0 UDP packet size to 1232 bytes, aligning with DNS Flag Day recommendations. Network administrators should also review DNS traffic patterns and consider implementing rate limiting or filtering to mitigate potential abuse. Given the fundamental role of DNS in internet and intranet communications, this vulnerability poses a significant risk to service availability.
Potential Impact
For European organizations, this vulnerability can lead to DNS service disruptions, impacting internal and external network communications. DNS outages can cause widespread application failures, loss of internet connectivity, and degraded user experience. Critical sectors such as finance, healthcare, telecommunications, and government services that rely heavily on stable DNS infrastructure could face operational interruptions. The disruption of DNS resolution may also affect cloud services and remote work capabilities, which are prevalent in Europe. Since the vulnerability can be exploited remotely without authentication, attackers could launch denial of service attacks against vulnerable DNS servers, potentially amplifying the impact. The availability impact could cascade into broader network outages, affecting business continuity and causing financial and reputational damage. European organizations with complex network environments using Dnsmasq as part of their DNS infrastructure are particularly at risk. Additionally, the vulnerability could be leveraged in multi-stage attacks where DNS disruption is used as a diversion or to degrade defenses.
Mitigation Recommendations
1. Upgrade all Dnsmasq instances to version 2.90 or later, which corrects the default EDNS0 UDP packet size setting to 1232 bytes. 2. Audit network devices and servers to identify any running vulnerable Dnsmasq versions and prioritize patching. 3. Configure DNS servers and firewalls to monitor and limit oversized UDP DNS packets, applying rate limiting to mitigate potential abuse. 4. Implement DNS response size controls and consider fallback to TCP for large DNS responses to avoid fragmentation issues. 5. Regularly monitor DNS traffic for anomalies that may indicate exploitation attempts or denial of service activities. 6. Educate network and security teams about the vulnerability and ensure incident response plans include DNS service disruption scenarios. 7. For critical infrastructure, consider deploying redundant DNS servers with patched software to ensure high availability. 8. Engage with upstream DNS providers and ISPs to ensure they are also protected against this vulnerability to reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2023-03-15T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6909262dfe7723195e0b5e7b
Added to database: 11/3/2025, 10:01:17 PM
Last enriched: 11/4/2025, 12:12:37 AM
Last updated: 11/6/2025, 2:13:49 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-5651: Improper Control of Generation of Code ('Code Injection')
HighCVE-2024-57520: n/a
CriticalCVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.