CVE-2025-12200: NULL Pointer Dereference in dnsmasq
A vulnerability was determined in dnsmasq up to 2.73rc6. Affected by this issue is the function parse_dhcp_opt of the file src/option.c of the component Config File Handler. This manipulation of the argument m causes null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-12200 is a vulnerability identified in the dnsmasq software, specifically affecting versions up to 2.73rc6. The issue resides in the parse_dhcp_opt function within the src/option.c file, part of the Config File Handler component. The vulnerability arises when the argument 'm' is manipulated, causing a NULL pointer dereference. This results in the dnsmasq process crashing, leading to a denial of service (DoS) condition. The attack vector is local, requiring the attacker to have low-level privileges on the affected system. No user interaction or network-based exploitation is possible, limiting the attack surface. The vulnerability has a CVSS 4.8 score, reflecting its medium severity, primarily due to its limited exploitability and impact confined to availability. Although the vendor was contacted early, no patch or response has been provided, and no known exploits are currently active in the wild. The public disclosure of the exploit code increases the risk of opportunistic attacks, especially in environments where dnsmasq is used for DHCP and DNS services on local machines or embedded devices. The vulnerability does not affect confidentiality or integrity but can disrupt network services dependent on dnsmasq, potentially impacting dependent applications and users.
Potential Impact
For European organizations, the primary impact of CVE-2025-12200 is service disruption due to denial of service on systems running vulnerable dnsmasq versions. This can affect DHCP and DNS resolution services locally, potentially causing network outages or degraded performance in environments relying on dnsmasq for local network management. Critical infrastructure, enterprise networks, and embedded systems using dnsmasq may experience interruptions, impacting business continuity. Although the attack requires local access, insider threats or compromised accounts could exploit this vulnerability to disrupt services. The lack of vendor response and patch availability increases risk exposure. Organizations with strict uptime requirements or those operating in sectors like telecommunications, manufacturing, or public services may face operational challenges. However, since the vulnerability does not allow remote exploitation or data compromise, the confidentiality and integrity of systems remain intact. The medium severity rating reflects these factors, emphasizing availability impact with limited attack vectors.
Mitigation Recommendations
European organizations should prioritize upgrading dnsmasq to a version later than 2.73rc6 once an official patch is released or consider applying community-developed patches if available. Until then, restrict local access to systems running vulnerable dnsmasq versions by enforcing strict user permissions and monitoring for unauthorized local activity. Employ host-based intrusion detection systems (HIDS) to detect abnormal process crashes or suspicious local behavior. Network segmentation can limit the exposure of critical systems to potentially malicious insiders. Regularly audit and harden systems to minimize the number of users with local access rights. Consider replacing dnsmasq with alternative DHCP/DNS solutions that are actively maintained and patched. Maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions. Finally, monitor security advisories for updates from the dnsmasq project or security community regarding patches or mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-12200: NULL Pointer Dereference in dnsmasq
Description
A vulnerability was determined in dnsmasq up to 2.73rc6. Affected by this issue is the function parse_dhcp_opt of the file src/option.c of the component Config File Handler. This manipulation of the argument m causes null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-12200 is a vulnerability identified in the dnsmasq software, specifically affecting versions up to 2.73rc6. The issue resides in the parse_dhcp_opt function within the src/option.c file, part of the Config File Handler component. The vulnerability arises when the argument 'm' is manipulated, causing a NULL pointer dereference. This results in the dnsmasq process crashing, leading to a denial of service (DoS) condition. The attack vector is local, requiring the attacker to have low-level privileges on the affected system. No user interaction or network-based exploitation is possible, limiting the attack surface. The vulnerability has a CVSS 4.8 score, reflecting its medium severity, primarily due to its limited exploitability and impact confined to availability. Although the vendor was contacted early, no patch or response has been provided, and no known exploits are currently active in the wild. The public disclosure of the exploit code increases the risk of opportunistic attacks, especially in environments where dnsmasq is used for DHCP and DNS services on local machines or embedded devices. The vulnerability does not affect confidentiality or integrity but can disrupt network services dependent on dnsmasq, potentially impacting dependent applications and users.
Potential Impact
For European organizations, the primary impact of CVE-2025-12200 is service disruption due to denial of service on systems running vulnerable dnsmasq versions. This can affect DHCP and DNS resolution services locally, potentially causing network outages or degraded performance in environments relying on dnsmasq for local network management. Critical infrastructure, enterprise networks, and embedded systems using dnsmasq may experience interruptions, impacting business continuity. Although the attack requires local access, insider threats or compromised accounts could exploit this vulnerability to disrupt services. The lack of vendor response and patch availability increases risk exposure. Organizations with strict uptime requirements or those operating in sectors like telecommunications, manufacturing, or public services may face operational challenges. However, since the vulnerability does not allow remote exploitation or data compromise, the confidentiality and integrity of systems remain intact. The medium severity rating reflects these factors, emphasizing availability impact with limited attack vectors.
Mitigation Recommendations
European organizations should prioritize upgrading dnsmasq to a version later than 2.73rc6 once an official patch is released or consider applying community-developed patches if available. Until then, restrict local access to systems running vulnerable dnsmasq versions by enforcing strict user permissions and monitoring for unauthorized local activity. Employ host-based intrusion detection systems (HIDS) to detect abnormal process crashes or suspicious local behavior. Network segmentation can limit the exposure of critical systems to potentially malicious insiders. Regularly audit and harden systems to minimize the number of users with local access rights. Consider replacing dnsmasq with alternative DHCP/DNS solutions that are actively maintained and patched. Maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions. Finally, monitor security advisories for updates from the dnsmasq project or security community regarding patches or mitigations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-25T06:22:04.063Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68fec91d23a7bbed324576ab
Added to database: 10/27/2025, 1:21:33 AM
Last enriched: 10/27/2025, 1:36:50 AM
Last updated: 10/28/2025, 3:40:08 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10939: Uncontrolled Search Path Element in Red Hat Red Hat Build of Keycloak
LowCVE-2025-12347: Unrestricted Upload in MaxSite CMS
MediumCVE-2025-12346: Unrestricted Upload in MaxSite CMS
MediumCVE-2024-1139: Exposure of Sensitive Information to an Unauthorized Actor
HighCVE-2025-12344: Unrestricted Upload in Yonyou U8 Cloud
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.