Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27854: Use After Free in PowerDNS DNSdist

0
Medium
VulnerabilityCVE-2026-27854cvecve-2026-27854
Published: Tue Mar 31 2026 (03/31/2026, 12:06:46 UTC)
Source: CVE Database V5
Vendor/Project: PowerDNS
Product: DNSdist

Description

CVE-2026-27854 is a medium severity use-after-free vulnerability in PowerDNS DNSdist versions 1. 9. 0 and 2. 0. 0. It arises when crafted DNS queries trigger the DNSQuestion:getEDNSOptions method in custom Lua code, potentially referencing a modified DNS packet version. This can lead to a use-after-free condition causing a crash and denial of service. The vulnerability requires no authentication or user interaction but has a high attack complexity. No known exploits are currently reported in the wild. The impact is primarily denial of service, with limited confidentiality impact.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 12:38:23 UTC

Technical Analysis

CVE-2026-27854 is a use-after-free vulnerability identified in PowerDNS DNSdist, a DNS load balancer and security tool, specifically affecting versions 1.9.0 and 2.0.0. The flaw occurs when an attacker sends specially crafted DNS queries that interact with the DNSQuestion:getEDNSOptions method within custom Lua scripts. This method may reference a modified version of the DNS packet, which has already been freed, leading to a use-after-free condition. Such memory misuse can cause the DNSdist process to crash, resulting in denial of service (DoS). The vulnerability does not require authentication or user interaction but has a high attack complexity, meaning exploitation is non-trivial and requires specific crafted input. The CVSS 3.1 score is 4.8 (medium), reflecting limited confidentiality impact, no integrity impact, and low availability impact limited to DoS. No known exploits have been reported in the wild, but the vulnerability poses a risk to DNS infrastructure relying on DNSdist, especially where custom Lua code is used. The absence of patches in the provided data suggests that organizations should monitor vendor advisories closely and consider mitigations to prevent exploitation.

Potential Impact

The primary impact of CVE-2026-27854 is denial of service through process crashes of DNSdist instances, potentially disrupting DNS load balancing and security functions. This can degrade network reliability and availability, affecting services dependent on DNS resolution. While confidentiality and integrity impacts are minimal or nonexistent, the availability impact can be significant in environments where DNSdist is critical for DNS traffic management. Organizations with high DNS traffic volumes or those using custom Lua scripts in DNSdist are at greater risk. Disruptions could affect internal networks, customer-facing services, and overall organizational operations. The medium severity and high attack complexity reduce the likelihood of widespread exploitation but do not eliminate the risk, especially from targeted attackers aiming to disrupt DNS infrastructure.

Mitigation Recommendations

To mitigate CVE-2026-27854, organizations should: 1) Apply vendor patches or updates as soon as they become available to address the use-after-free flaw. 2) Review and audit custom Lua scripts used within DNSdist to identify and limit usage of the DNSQuestion:getEDNSOptions method, especially with untrusted input. 3) Implement network-level protections such as rate limiting and filtering to reduce exposure to crafted malicious DNS queries. 4) Deploy DNSdist instances behind firewalls or access controls to restrict query sources to trusted networks. 5) Monitor DNSdist logs and system behavior for signs of crashes or anomalous activity indicative of exploitation attempts. 6) Consider redundancy and failover mechanisms for DNS infrastructure to maintain availability in case of service disruption. 7) Engage in proactive vulnerability management and threat intelligence monitoring for updates on exploit developments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
OX
Date Reserved
2026-02-24T08:46:09.373Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cbbcb5e6bfc5ba1d1244f6

Added to database: 3/31/2026, 12:23:17 PM

Last enriched: 3/31/2026, 12:38:23 PM

Last updated: 3/31/2026, 1:32:53 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses