CVE-2026-42254: CWE-706 Use of Incorrectly-Resolved Name or Reference in Hickory Project Hickory DNS
Hickory DNS hickory-recursor 0.1 through 0.25.2 allows cross-zone poisoning because cached data is not directly associated with a query that triggered a response.
AI Analysis
Technical Summary
Hickory DNS versions 0.1 through 0.25.2 suffer from a CWE-706 vulnerability where cached DNS data is not directly linked to the query that caused the response, enabling cross-zone poisoning. This means that an attacker could potentially cause the DNS resolver to return incorrect DNS records by exploiting the improper association of cached data, affecting the integrity of DNS responses. The CVSS 3.1 base score is 4.0, reflecting a network attack vector with high attack complexity and no privileges or user interaction required. The vulnerability does not impact confidentiality or availability but can cause limited integrity issues. No vendor advisory or patch is currently available, and the product is not a cloud service, so remediation is not managed by the vendor.
Potential Impact
The vulnerability allows an attacker to perform cross-zone poisoning by exploiting the incorrect association of cached DNS data, potentially causing the DNS resolver to return incorrect DNS records. This impacts the integrity of DNS responses but does not affect confidentiality or availability. There are no known exploits in the wild, and the overall impact is rated medium severity with a CVSS score of 4.0.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official patch or remediation level is provided, users should monitor Hickory Project communications for updates. In the absence of a fix, consider limiting exposure of vulnerable Hickory DNS instances to untrusted networks to reduce risk.
CVE-2026-42254: CWE-706 Use of Incorrectly-Resolved Name or Reference in Hickory Project Hickory DNS
Description
Hickory DNS hickory-recursor 0.1 through 0.25.2 allows cross-zone poisoning because cached data is not directly associated with a query that triggered a response.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Hickory DNS versions 0.1 through 0.25.2 suffer from a CWE-706 vulnerability where cached DNS data is not directly linked to the query that caused the response, enabling cross-zone poisoning. This means that an attacker could potentially cause the DNS resolver to return incorrect DNS records by exploiting the improper association of cached data, affecting the integrity of DNS responses. The CVSS 3.1 base score is 4.0, reflecting a network attack vector with high attack complexity and no privileges or user interaction required. The vulnerability does not impact confidentiality or availability but can cause limited integrity issues. No vendor advisory or patch is currently available, and the product is not a cloud service, so remediation is not managed by the vendor.
Potential Impact
The vulnerability allows an attacker to perform cross-zone poisoning by exploiting the incorrect association of cached DNS data, potentially causing the DNS resolver to return incorrect DNS records. This impacts the integrity of DNS responses but does not affect confidentiality or availability. There are no known exploits in the wild, and the overall impact is rated medium severity with a CVSS score of 4.0.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official patch or remediation level is provided, users should monitor Hickory Project communications for updates. In the absence of a fix, consider limiting exposure of vulnerable Hickory DNS instances to untrusted networks to reduce risk.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-04-26T02:38:40.734Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69ed7d9287115cfb68904a19
Added to database: 4/26/2026, 2:50:58 AM
Last enriched: 4/26/2026, 3:06:16 AM
Last updated: 4/26/2026, 5:05:49 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.