Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59030: CWE-276 Incorrect Default Permissions in PowerDNS Recursor

0
High
VulnerabilityCVE-2025-59030cvecve-2025-59030cwe-276
Published: Tue Dec 09 2025 (12/09/2025, 09:15:43 UTC)
Source: CVE Database V5
Vendor/Project: PowerDNS
Product: Recursor

Description

An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP.

AI-Powered Analysis

AILast updated: 12/16/2025, 10:36:12 UTC

Technical Analysis

CVE-2025-59030 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting PowerDNS Recursor versions 5.1.0, 5.2.0, and 5.3.0. The flaw allows an unauthenticated attacker to send a specially crafted NOTIFY query over TCP to the DNS recursor service, which triggers the removal of cached DNS records. This cache invalidation leads to a denial of service (DoS) condition by forcing the DNS resolver to repeatedly query upstream servers, increasing latency and potentially overwhelming the resolver or upstream infrastructure. The vulnerability arises due to improper handling of NOTIFY queries and insufficient permission checks or validation on these requests. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects the availability (A:H) of the service without compromising confidentiality or integrity. The vulnerability was publicly disclosed on December 9, 2025, with no known exploits in the wild at the time of publication. PowerDNS Recursor is widely used in DNS infrastructure for recursive resolution, making this vulnerability significant for DNS service stability. The absence of patches at the time of disclosure necessitates immediate mitigation efforts to prevent exploitation.

Potential Impact

For European organizations, the primary impact of CVE-2025-59030 is on the availability of DNS resolution services. DNS is a critical component of network infrastructure, and disruption can lead to widespread service outages, degraded performance, and potential cascading failures in dependent applications and services. Organizations relying on PowerDNS Recursor for internal or external DNS resolution may experience increased latency, failed domain resolutions, or temporary denial of service. This can affect enterprises, ISPs, cloud providers, and critical infrastructure operators. The lack of impact on confidentiality or integrity reduces risks of data breaches or manipulation, but availability issues can still cause significant operational and financial damage. In sectors such as finance, healthcare, telecommunications, and government, DNS outages can disrupt essential services and erode trust. Additionally, attackers could leverage this vulnerability as part of a larger attack chain to degrade network defenses or distract security teams.

Mitigation Recommendations

1. Monitor DNS traffic for unusual or unexpected NOTIFY queries over TCP and implement alerting mechanisms. 2. Apply vendor patches promptly once available to address the underlying permission and validation issues. 3. In the interim, restrict or block incoming TCP NOTIFY queries at the network perimeter or firewall to prevent exploitation. 4. Harden DNS recursor configurations by disabling unnecessary features or query types if possible. 5. Employ rate limiting on DNS queries to mitigate potential DoS amplification. 6. Conduct regular audits of DNS server configurations and permissions to ensure adherence to security best practices. 7. Use network segmentation to isolate DNS infrastructure and limit exposure to untrusted networks. 8. Collaborate with upstream DNS providers and peers to detect and respond to anomalous DNS traffic patterns. 9. Prepare incident response plans specific to DNS service disruptions to minimize downtime and impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
OX
Date Reserved
2025-09-08T14:22:28.105Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6937f1ad27e9f45fce65730e

Added to database: 12/9/2025, 9:53:49 AM

Last enriched: 12/16/2025, 10:36:12 AM

Last updated: 2/4/2026, 7:54:41 PM

Views: 147

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats