Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24028: Buffer Over-read in PowerDNS DNSdist

0
Medium
VulnerabilityCVE-2026-24028cvecve-2026-24028
Published: Tue Mar 31 2026 (03/31/2026, 11:57:26 UTC)
Source: CVE Database V5
Vendor/Project: PowerDNS
Product: DNSdist

Description

CVE-2026-24028 is a medium severity buffer over-read vulnerability in PowerDNS DNSdist versions 1. 9. 0 and 2. 0. 0. It occurs when an attacker sends a crafted DNS response packet that triggers an out-of-bounds read during parsing by custom Lua code using newDNSPacketOverlay. This can cause DNSdist to crash, resulting in denial of service, or potentially disclose unrelated memory contents. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. No known exploits are currently reported in the wild. Organizations using affected DNSdist versions should apply patches or mitigate exposure to untrusted DNS responses to prevent service disruption or information leakage.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 12:39:17 UTC

Technical Analysis

CVE-2026-24028 is a vulnerability identified in PowerDNS DNSdist, a DNS load balancer and firewall product, specifically affecting versions 1.9.0 and 2.0.0. The issue arises from an out-of-bounds read triggered by specially crafted DNS response packets when custom Lua scripts utilize the newDNSPacketOverlay API to parse DNS packets. This API is designed to facilitate packet inspection and manipulation within DNSdist. The crafted packet causes the Lua code to read memory beyond the intended buffer boundaries, leading to two primary impacts: a crash of the DNSdist process (denial of service) or potential disclosure of unrelated memory contents, which could leak sensitive information. The vulnerability is exploitable remotely without any authentication or user interaction, as it only requires sending a malicious DNS response to the vulnerable DNSdist instance. The CVSS 3.1 base score is 5.3, reflecting a medium severity primarily due to the lack of confidentiality or integrity impact and the requirement for a crafted response packet. No public exploits or active exploitation have been reported as of the publication date. The vulnerability highlights risks in custom Lua scripting environments within DNS infrastructure, emphasizing the need for careful input validation and memory safety when parsing network data.

Potential Impact

The primary impact of CVE-2026-24028 is the potential for denial of service through DNSdist crashes, which can disrupt DNS resolution services relying on DNSdist as a load balancer or firewall. This disruption can affect availability of critical network services and applications dependent on DNS. Additionally, the out-of-bounds read may lead to information disclosure by exposing unrelated memory contents, which could include sensitive data such as cryptographic keys, configuration details, or user data, depending on the memory layout. Although the confidentiality impact is not confirmed, the possibility of leakage poses a risk to organizations handling sensitive DNS traffic. Since DNSdist is often deployed in front-line DNS infrastructure, exploitation could affect large-scale DNS operations, impacting enterprises, ISPs, and cloud providers. The vulnerability does not require authentication or user interaction, increasing the risk of remote exploitation by attackers who can send crafted DNS responses. However, the need for custom Lua code usage of newDNSPacketOverlay somewhat limits the attack surface to environments leveraging this feature.

Mitigation Recommendations

To mitigate CVE-2026-24028, organizations should first apply any available patches or updates from PowerDNS addressing this vulnerability once released. Until patches are available, administrators should review and restrict the use of custom Lua scripts that utilize newDNSPacketOverlay, especially those parsing untrusted DNS responses. Network-level controls should be implemented to limit exposure to untrusted or potentially malicious DNS traffic, such as filtering DNS responses from unknown or suspicious sources. Deploying DNSdist behind trusted DNS resolvers or within controlled network segments can reduce risk. Monitoring DNSdist logs for crashes or unusual behavior can help detect exploitation attempts. Additionally, consider disabling or limiting Lua scripting capabilities if not essential, or applying strict input validation within Lua scripts to prevent out-of-bounds reads. Regular security assessments and code reviews of custom Lua scripts are recommended to identify and remediate unsafe parsing logic.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
OX
Date Reserved
2026-01-20T14:56:25.872Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cbbcb5e6bfc5ba1d1244ea

Added to database: 3/31/2026, 12:23:17 PM

Last enriched: 3/31/2026, 12:39:17 PM

Last updated: 3/31/2026, 1:32:53 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses