Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12200: NULL Pointer Dereference in dnsmasq

0
Medium
VulnerabilityCVE-2025-12200cvecve-2025-12200
Published: Mon Oct 27 2025 (10/27/2025, 01:07:44 UTC)
Source: CVE Database V5
Product: dnsmasq

Description

A vulnerability was determined in dnsmasq up to 2.73rc6. Affected by this issue is the function parse_dhcp_opt of the file src/option.c of the component Config File Handler. This manipulation of the argument m causes null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/27/2025, 01:36:50 UTC

Technical Analysis

CVE-2025-12200 is a vulnerability identified in the dnsmasq software, specifically affecting versions up to 2.73rc6. The issue resides in the parse_dhcp_opt function within the src/option.c file, part of the Config File Handler component. The vulnerability arises when the argument 'm' is manipulated, causing a NULL pointer dereference. This results in the dnsmasq process crashing, leading to a denial of service (DoS) condition. The attack vector is local, requiring the attacker to have low-level privileges on the affected system. No user interaction or network-based exploitation is possible, limiting the attack surface. The vulnerability has a CVSS 4.8 score, reflecting its medium severity, primarily due to its limited exploitability and impact confined to availability. Although the vendor was contacted early, no patch or response has been provided, and no known exploits are currently active in the wild. The public disclosure of the exploit code increases the risk of opportunistic attacks, especially in environments where dnsmasq is used for DHCP and DNS services on local machines or embedded devices. The vulnerability does not affect confidentiality or integrity but can disrupt network services dependent on dnsmasq, potentially impacting dependent applications and users.

Potential Impact

For European organizations, the primary impact of CVE-2025-12200 is service disruption due to denial of service on systems running vulnerable dnsmasq versions. This can affect DHCP and DNS resolution services locally, potentially causing network outages or degraded performance in environments relying on dnsmasq for local network management. Critical infrastructure, enterprise networks, and embedded systems using dnsmasq may experience interruptions, impacting business continuity. Although the attack requires local access, insider threats or compromised accounts could exploit this vulnerability to disrupt services. The lack of vendor response and patch availability increases risk exposure. Organizations with strict uptime requirements or those operating in sectors like telecommunications, manufacturing, or public services may face operational challenges. However, since the vulnerability does not allow remote exploitation or data compromise, the confidentiality and integrity of systems remain intact. The medium severity rating reflects these factors, emphasizing availability impact with limited attack vectors.

Mitigation Recommendations

European organizations should prioritize upgrading dnsmasq to a version later than 2.73rc6 once an official patch is released or consider applying community-developed patches if available. Until then, restrict local access to systems running vulnerable dnsmasq versions by enforcing strict user permissions and monitoring for unauthorized local activity. Employ host-based intrusion detection systems (HIDS) to detect abnormal process crashes or suspicious local behavior. Network segmentation can limit the exposure of critical systems to potentially malicious insiders. Regularly audit and harden systems to minimize the number of users with local access rights. Consider replacing dnsmasq with alternative DHCP/DNS solutions that are actively maintained and patched. Maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions. Finally, monitor security advisories for updates from the dnsmasq project or security community regarding patches or mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T06:22:04.063Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68fec91d23a7bbed324576ab

Added to database: 10/27/2025, 1:21:33 AM

Last enriched: 10/27/2025, 1:36:50 AM

Last updated: 10/28/2025, 3:40:08 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats