Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11411: CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data in NLnet Labs Unbound

0
Medium
VulnerabilityCVE-2025-11411cvecve-2025-11411cwe-349
Published: Wed Oct 22 2025 (10/22/2025, 12:28:02 UTC)
Source: CVE Database V5
Vendor/Project: NLnet Labs
Product: Unbound

Description

NLnet Labs Unbound up to and including version 1.24.1 is vulnerable to possible domain hijack attacks. Promiscuous NS RRSets that complement positive DNS replies in the authority section can be used to trick resolvers to update their delegation information for the zone. Usually these RRSets are used to update the resolver's knowledge of the zone's name servers. A malicious actor can exploit the possible poisonous effect by injecting NS RRSets (and possibly their respective address records) in a reply. This could be done for example by trying to spoof a packet or fragmentation attacks. Unbound would then proceed to update the NS RRSet data it already has since the new data has enough trust for it, i.e., in-zone data for the delegation point. Unbound 1.24.1 includes a fix that scrubs unsolicited NS RRSets (and their respective address records) from replies mitigating the possible poison effect. Unbound 1.24.2 includes an additional fix that scrubs unsolicited NS RRSets (and their respective address records) from YXDOMAIN and non-referral nodata replies, further mitigating the possible poison effect.

AI-Powered Analysis

AILast updated: 12/10/2025, 14:47:09 UTC

Technical Analysis

CVE-2025-11411 is a vulnerability in NLnet Labs Unbound DNS resolver software, affecting versions up to and including 1.24.1. The issue stems from Unbound's acceptance of unsolicited NS RRSets (Name Server Resource Record Sets) in DNS responses, which are typically used to update the resolver's delegation information for DNS zones. Normally, these NS RRSets are trusted when they come as part of authoritative delegation data. However, Unbound incorrectly accepts extraneous NS RRSets included in the authority section of DNS replies, even when these are unsolicited and potentially malicious. An attacker can exploit this by injecting spoofed DNS responses containing malicious NS RRSets and their associated address records, possibly leveraging packet spoofing or fragmentation attacks to bypass validation. This causes Unbound to update its cached delegation information with attacker-controlled name servers, effectively hijacking DNS queries for the targeted zone. This vulnerability is categorized under CWE-349, which involves acceptance of extraneous untrusted data alongside trusted data, leading to trust boundary violations. The vulnerability impacts the integrity and potentially the confidentiality of DNS resolution. Unbound 1.24.1 introduced a fix that scrubs unsolicited NS RRSets and their address records from replies to prevent poisoning. Version 1.24.2 further extends this scrubbing to YXDOMAIN and non-referral nodata replies, closing additional attack vectors. The CVSS 4.0 score is 5.7 (medium severity), reflecting the attack vector as adjacent network, low complexity, no privileges required, no user interaction, but with high impact on integrity and scope. No known exploits have been reported in the wild to date. The vulnerability requires an attacker to be able to inject or spoof DNS responses, which may be feasible in certain network environments, such as those lacking proper DNSSEC validation or network-level protections.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity and trustworthiness of DNS resolution services if they use affected versions of Unbound. Successful exploitation can lead to domain hijacking, redirecting users to malicious sites, enabling phishing, data interception, or malware distribution. This undermines confidentiality by potentially exposing sensitive communications and integrity by corrupting DNS data. Availability could also be indirectly affected if DNS resolution is disrupted. Organizations relying on Unbound for critical infrastructure, internal DNS resolution, or recursive DNS services may face operational disruptions and reputational damage. Given the widespread use of Unbound in Europe, especially in academic, governmental, and enterprise environments valuing open-source DNS solutions, the impact could be broad. Additionally, attackers exploiting this vulnerability could leverage it for further lateral movement or espionage, particularly in sectors with high-value targets such as finance, energy, and government. The lack of known exploits reduces immediate risk, but the medium severity and ease of exploitation in adjacent networks warrant prompt attention.

Mitigation Recommendations

To mitigate CVE-2025-11411, European organizations should immediately upgrade all Unbound DNS resolver instances to version 1.24.2 or later, which includes comprehensive fixes for unsolicited NS RRSet scrubbing. Network administrators should enforce strict network segmentation and filtering to prevent spoofed DNS packets from untrusted sources, including implementing ingress and egress filtering (BCP 38) to reduce IP spoofing risks. Deploying DNSSEC validation on resolvers can help detect and reject forged DNS data, although this vulnerability targets delegation data acceptance and may require careful configuration. Monitoring DNS resolver logs for unusual NS RRSet updates or unexpected delegation changes can provide early detection of exploitation attempts. Organizations should also review and harden fragmentation handling in network devices to prevent fragmentation-based spoofing attacks. Regular vulnerability scanning and patch management processes must include Unbound components. Finally, educating network security teams about this specific threat and its exploitation vectors will improve incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
NLnet Labs
Date Reserved
2025-10-07T09:07:44.926Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f8d2c779108345beab68dd

Added to database: 10/22/2025, 12:49:11 PM

Last enriched: 12/10/2025, 2:47:09 PM

Last updated: 2/7/2026, 2:00:39 AM

Views: 748

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats