Skip to main content

CVE-2025-30194: CWE-416 User After Free in PowerDNS DNSdist

High
VulnerabilityCVE-2025-30194cvecve-2025-30194cwe-416
Published: Tue Apr 29 2025 (04/29/2025, 11:25:47 UTC)
Source: CVE
Vendor/Project: PowerDNS
Product: DNSdist

Description

When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.9 version. A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version. We would like to thank Charles Howes for bringing this issue to our attention.

AI-Powered Analysis

AILast updated: 06/24/2025, 23:19:17 UTC

Technical Analysis

CVE-2025-30194 is a high-severity vulnerability affecting PowerDNS DNSdist version 1.9.0 when configured to provide DNS over HTTPS (DoH) via the nghttp2 provider. The vulnerability is classified as a Use-After-Free (CWE-416) flaw, specifically a double-free memory error. An attacker can exploit this by crafting a malicious DoH exchange that triggers illegal memory access within DNSdist, causing the application to crash. This results in a denial of service (DoS) condition, disrupting DNS resolution services provided by DNSdist. The vulnerability does not impact confidentiality or integrity but solely affects availability. Exploitation requires no privileges or user interaction and can be performed remotely over the network. The vendor has released a patched version 1.9.9 to remediate the issue. As a temporary workaround, administrators can switch the DoH provider from nghttp2 to h2o until the upgrade is applied. There are no known exploits in the wild at the time of publication, but the ease of exploitation and the critical role of DNS infrastructure make this a significant threat. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, low complexity, no privileges required, and no user interaction needed, with impact limited to availability.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of DNS services when DNSdist is deployed as a DoH proxy or load balancer using the nghttp2 provider. DNSdist is widely used in DNS infrastructure for performance and security enhancements, including in ISPs, enterprises, and critical infrastructure providers. A successful attack could cause DNS resolution failures, leading to service outages, degraded network performance, and potential cascading effects on dependent applications and services. This is particularly critical for organizations relying on DNSdist for DoH, which is increasingly adopted to enhance DNS privacy and security. Disruptions could affect financial institutions, government agencies, telecommunications providers, and cloud service operators across Europe, potentially impacting end-users and business continuity. While no data breach or integrity compromise is expected, the denial of service could be leveraged in larger multi-vector attacks or cause operational disruptions during peak usage or critical events.

Mitigation Recommendations

1. Immediate upgrade to PowerDNS DNSdist version 1.9.9 or later, which contains the patch fixing the double-free vulnerability. 2. Until the upgrade can be applied, reconfigure DNSdist to use the h2o DoH provider instead of nghttp2 to mitigate the risk of exploitation. 3. Implement network-level protections such as rate limiting and anomaly detection on DoH traffic to identify and block suspicious or malformed DoH requests that could trigger the vulnerability. 4. Monitor DNSdist logs and system stability closely for signs of crashes or unusual behavior indicative of attempted exploitation. 5. Maintain an inventory of DNSdist deployments and their configurations to ensure all instances using nghttp2 for DoH are identified and remediated promptly. 6. Coordinate with upstream providers and partners to share threat intelligence and ensure a unified response to potential exploitation attempts. 7. Consider deploying redundant DNS infrastructure and failover mechanisms to minimize service disruption in case of an attack exploiting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
OX
Date Reserved
2025-03-18T08:39:46.884Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef0a3

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 11:19:17 PM

Last updated: 8/15/2025, 3:14:30 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats