CVE-2025-30193: CWE-674 Uncontrolled Recursion in PowerDNS DNSdist
In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stack and a crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.10 version. A workaround is to restrict the maximum number of queries on incoming TCP connections to a safe value, like 50, via the setMaxTCPQueriesPerConnection setting. We would like to thank Renaud Allard for bringing this issue to our attention.
AI Analysis
Technical Summary
CVE-2025-30193 is a high-severity vulnerability affecting PowerDNS DNSdist, a DNS load balancer and proxy widely used to manage and secure DNS traffic. The vulnerability arises from uncontrolled recursion in the handling of TCP connections when DNSdist is configured to allow an unlimited number of queries on a single incoming TCP connection. An attacker can exploit this by crafting a malicious TCP exchange that triggers excessive recursive calls, leading to stack exhaustion and ultimately causing the DNSdist process to crash. This results in a denial of service (DoS) condition, disrupting DNS resolution services dependent on DNSdist. The vulnerability is classified under CWE-674 (Uncontrolled Recursion), indicating that the recursive logic lacks proper bounds checking or termination conditions. The CVSS v3.1 base score is 7.5, reflecting a high impact primarily on availability, with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects the system scope (S:U). The vulnerability does not require authentication and can be triggered remotely by any attacker capable of establishing a TCP connection to the vulnerable DNSdist instance. The recommended remediation is to upgrade to DNSdist version 1.9.10 or later, where the issue is patched. As a workaround, administrators can limit the maximum number of queries per TCP connection using the setMaxTCPQueriesPerConnection setting to a safe threshold (e.g., 50), thereby preventing excessive recursion and stack exhaustion. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on PowerDNS DNSdist for DNS traffic management and load balancing. A successful exploitation leads to denial of service, causing DNS resolution failures that can disrupt internal and external network communications, impacting business operations, customer-facing services, and critical infrastructure. This can affect availability of web services, email, and other DNS-dependent applications. Given the central role of DNS in network operations, the DoS could cascade into broader operational disruptions. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure are particularly at risk due to their reliance on stable DNS services. The lack of confidentiality or integrity impact limits data breach concerns, but the availability impact alone can cause significant operational and reputational damage. Additionally, the ease of exploitation without authentication or user interaction increases the risk of opportunistic attacks or targeted disruption campaigns.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately upgrade all DNSdist instances to version 1.9.10 or later, ensuring the patch is applied promptly. 2) If immediate upgrade is not feasible, configure the setMaxTCPQueriesPerConnection setting to a conservative limit such as 50 queries per TCP connection to prevent uncontrolled recursion and stack exhaustion. 3) Monitor DNSdist logs and network traffic for unusual patterns of TCP connections with excessive queries, which may indicate attempted exploitation. 4) Implement network-level protections such as rate limiting and connection throttling on DNSdist TCP ports to reduce the risk of abuse. 5) Conduct regular vulnerability assessments and penetration testing focused on DNS infrastructure to detect similar issues proactively. 6) Maintain an incident response plan that includes DNS service continuity measures, such as failover DNS servers or alternative DNS providers, to minimize downtime in case of an attack. 7) Educate network and security teams about this vulnerability and ensure timely communication of patches and configuration changes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-30193: CWE-674 Uncontrolled Recursion in PowerDNS DNSdist
Description
In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stack and a crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.10 version. A workaround is to restrict the maximum number of queries on incoming TCP connections to a safe value, like 50, via the setMaxTCPQueriesPerConnection setting. We would like to thank Renaud Allard for bringing this issue to our attention.
AI-Powered Analysis
Technical Analysis
CVE-2025-30193 is a high-severity vulnerability affecting PowerDNS DNSdist, a DNS load balancer and proxy widely used to manage and secure DNS traffic. The vulnerability arises from uncontrolled recursion in the handling of TCP connections when DNSdist is configured to allow an unlimited number of queries on a single incoming TCP connection. An attacker can exploit this by crafting a malicious TCP exchange that triggers excessive recursive calls, leading to stack exhaustion and ultimately causing the DNSdist process to crash. This results in a denial of service (DoS) condition, disrupting DNS resolution services dependent on DNSdist. The vulnerability is classified under CWE-674 (Uncontrolled Recursion), indicating that the recursive logic lacks proper bounds checking or termination conditions. The CVSS v3.1 base score is 7.5, reflecting a high impact primarily on availability, with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects the system scope (S:U). The vulnerability does not require authentication and can be triggered remotely by any attacker capable of establishing a TCP connection to the vulnerable DNSdist instance. The recommended remediation is to upgrade to DNSdist version 1.9.10 or later, where the issue is patched. As a workaround, administrators can limit the maximum number of queries per TCP connection using the setMaxTCPQueriesPerConnection setting to a safe threshold (e.g., 50), thereby preventing excessive recursion and stack exhaustion. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on PowerDNS DNSdist for DNS traffic management and load balancing. A successful exploitation leads to denial of service, causing DNS resolution failures that can disrupt internal and external network communications, impacting business operations, customer-facing services, and critical infrastructure. This can affect availability of web services, email, and other DNS-dependent applications. Given the central role of DNS in network operations, the DoS could cascade into broader operational disruptions. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure are particularly at risk due to their reliance on stable DNS services. The lack of confidentiality or integrity impact limits data breach concerns, but the availability impact alone can cause significant operational and reputational damage. Additionally, the ease of exploitation without authentication or user interaction increases the risk of opportunistic attacks or targeted disruption campaigns.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately upgrade all DNSdist instances to version 1.9.10 or later, ensuring the patch is applied promptly. 2) If immediate upgrade is not feasible, configure the setMaxTCPQueriesPerConnection setting to a conservative limit such as 50 queries per TCP connection to prevent uncontrolled recursion and stack exhaustion. 3) Monitor DNSdist logs and network traffic for unusual patterns of TCP connections with excessive queries, which may indicate attempted exploitation. 4) Implement network-level protections such as rate limiting and connection throttling on DNSdist TCP ports to reduce the risk of abuse. 5) Conduct regular vulnerability assessments and penetration testing focused on DNS infrastructure to detect similar issues proactively. 6) Maintain an incident response plan that includes DNS service continuity measures, such as failover DNS servers or alternative DNS providers, to minimize downtime in case of an attack. 7) Educate network and security teams about this vulnerability and ensure timely communication of patches and configuration changes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- OX
- Date Reserved
- 2025-03-18T08:39:46.884Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeb142
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/11/2025, 2:02:34 PM
Last updated: 7/31/2025, 6:26:05 AM
Views: 19
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.