CVE-2025-5994: CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data in NLnet Labs Unbound
A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.
AI Analysis
Technical Summary
CVE-2025-5994 is a high-severity vulnerability affecting the NLnet Labs Unbound DNS resolver when compiled with EDNS Client Subnet (ECS) support enabled (using the '--enable-subnet' compile option) and configured to send ECS information upstream (via 'send-client-subnet', 'client-subnet-zone', or 'client-subnet-always-forward' settings). The vulnerability is a multi-vendor cache poisoning flaw known as the 'Rebirthday Attack', which exploits the birthday paradox to increase the probability of guessing DNS transaction IDs and injecting malicious DNS responses into the resolver's cache. ECS is a DNS extension designed to improve content delivery by including part of the client’s subnet in DNS queries, allowing upstream servers to tailor responses geographically. However, ECS requires resolvers to segregate outgoing queries based on ECS data to prevent cache poisoning. The vulnerability arises because some resolvers, including Unbound under the specified conditions, fail to properly segregate these queries, allowing attackers to match transaction IDs and inject non-ECS poisoned replies into the cache. This can lead to cache poisoning where malicious DNS responses are cached and served to clients, redirecting them to attacker-controlled IP addresses or disrupting DNS resolution. The CVSS 4.0 score is 8.7 (high), reflecting the network attack vector, no required privileges or user interaction, and a significant impact on confidentiality due to the ability to redirect traffic. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and requires prompt attention. The affected version is Unbound 1.6.2, and the issue was published on July 16, 2025.
Potential Impact
For European organizations, the Rebirthday Attack vulnerability poses a significant risk to DNS infrastructure integrity and confidentiality. DNS cache poisoning can lead to widespread redirection of legitimate traffic to malicious sites, enabling phishing, malware distribution, data interception, and man-in-the-middle attacks. Organizations relying on Unbound with ECS enabled for DNS resolution—common in ISPs, enterprises, and content delivery networks—may experience compromised DNS responses, potentially affecting internal and external services. This can disrupt business operations, damage reputation, and expose sensitive data. Given the critical role of DNS in network operations, successful exploitation could also impact availability indirectly through service disruption or denial-of-service conditions caused by poisoned caches. The vulnerability’s exploitation does not require authentication or user interaction, increasing the attack surface. European entities in sectors such as finance, telecommunications, government, and critical infrastructure are particularly at risk due to their reliance on secure and reliable DNS resolution and the potential high impact of traffic redirection or interception.
Mitigation Recommendations
To mitigate CVE-2025-5994, European organizations using Unbound should: 1) Immediately verify if their Unbound installations are compiled with ECS support and configured to send ECS data upstream. 2) Upgrade to a patched version of Unbound once available from NLnet Labs, as no patch links are currently provided but should be prioritized upon release. 3) Temporarily disable ECS support or the sending of ECS information upstream if upgrading is not immediately feasible, to prevent exposure to the birthday paradox attack. 4) Implement strict DNS query segregation based on ECS data to ensure that queries with different ECS values do not share cache entries, preventing poisoning. 5) Monitor DNS resolver logs for unusual cache poisoning indicators or anomalous DNS responses. 6) Employ DNSSEC validation where possible to cryptographically verify DNS responses and mitigate cache poisoning risks. 7) Coordinate with upstream DNS providers to ensure they handle ECS queries securely and support DNSSEC. 8) Conduct internal audits of DNS resolver configurations and network traffic to detect and respond to potential exploitation attempts. These steps go beyond generic advice by focusing on ECS-specific configurations and operational controls tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2025-5994: CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data in NLnet Labs Unbound
Description
A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.
AI-Powered Analysis
Technical Analysis
CVE-2025-5994 is a high-severity vulnerability affecting the NLnet Labs Unbound DNS resolver when compiled with EDNS Client Subnet (ECS) support enabled (using the '--enable-subnet' compile option) and configured to send ECS information upstream (via 'send-client-subnet', 'client-subnet-zone', or 'client-subnet-always-forward' settings). The vulnerability is a multi-vendor cache poisoning flaw known as the 'Rebirthday Attack', which exploits the birthday paradox to increase the probability of guessing DNS transaction IDs and injecting malicious DNS responses into the resolver's cache. ECS is a DNS extension designed to improve content delivery by including part of the client’s subnet in DNS queries, allowing upstream servers to tailor responses geographically. However, ECS requires resolvers to segregate outgoing queries based on ECS data to prevent cache poisoning. The vulnerability arises because some resolvers, including Unbound under the specified conditions, fail to properly segregate these queries, allowing attackers to match transaction IDs and inject non-ECS poisoned replies into the cache. This can lead to cache poisoning where malicious DNS responses are cached and served to clients, redirecting them to attacker-controlled IP addresses or disrupting DNS resolution. The CVSS 4.0 score is 8.7 (high), reflecting the network attack vector, no required privileges or user interaction, and a significant impact on confidentiality due to the ability to redirect traffic. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and requires prompt attention. The affected version is Unbound 1.6.2, and the issue was published on July 16, 2025.
Potential Impact
For European organizations, the Rebirthday Attack vulnerability poses a significant risk to DNS infrastructure integrity and confidentiality. DNS cache poisoning can lead to widespread redirection of legitimate traffic to malicious sites, enabling phishing, malware distribution, data interception, and man-in-the-middle attacks. Organizations relying on Unbound with ECS enabled for DNS resolution—common in ISPs, enterprises, and content delivery networks—may experience compromised DNS responses, potentially affecting internal and external services. This can disrupt business operations, damage reputation, and expose sensitive data. Given the critical role of DNS in network operations, successful exploitation could also impact availability indirectly through service disruption or denial-of-service conditions caused by poisoned caches. The vulnerability’s exploitation does not require authentication or user interaction, increasing the attack surface. European entities in sectors such as finance, telecommunications, government, and critical infrastructure are particularly at risk due to their reliance on secure and reliable DNS resolution and the potential high impact of traffic redirection or interception.
Mitigation Recommendations
To mitigate CVE-2025-5994, European organizations using Unbound should: 1) Immediately verify if their Unbound installations are compiled with ECS support and configured to send ECS data upstream. 2) Upgrade to a patched version of Unbound once available from NLnet Labs, as no patch links are currently provided but should be prioritized upon release. 3) Temporarily disable ECS support or the sending of ECS information upstream if upgrading is not immediately feasible, to prevent exposure to the birthday paradox attack. 4) Implement strict DNS query segregation based on ECS data to ensure that queries with different ECS values do not share cache entries, preventing poisoning. 5) Monitor DNS resolver logs for unusual cache poisoning indicators or anomalous DNS responses. 6) Employ DNSSEC validation where possible to cryptographically verify DNS responses and mitigate cache poisoning risks. 7) Coordinate with upstream DNS providers to ensure they handle ECS queries securely and support DNSSEC. 8) Conduct internal audits of DNS resolver configurations and network traffic to detect and respond to potential exploitation attempts. These steps go beyond generic advice by focusing on ECS-specific configurations and operational controls tailored to the nature of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- NLnet Labs
- Date Reserved
- 2025-06-11T09:08:05.767Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6877bb51a83201eaacdbe12a
Added to database: 7/16/2025, 2:46:41 PM
Last enriched: 7/16/2025, 3:01:12 PM
Last updated: 10/15/2025, 11:52:38 AM
Views: 101
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-55082: CWE-125 Out-of-bounds Read in Eclipse Foundation NetX Duo
MediumCVE-2025-55081: CWE-126: Buffer Over-read in Eclipse Foundation NetX Duo
MediumHackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access
HighCVE-2025-9967: CWE-288 Authentication Bypass Using an Alternate Path or Channel in gsayed786 Orion SMS OTP Verification
CriticalCVE-2025-11728: CWE-306 Missing Authentication for Critical Function in oceanpayment Oceanpayment CreditCard Gateway
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.