Search for vulnerabilities
| Vulnerability ID | VCID-wywf-pmyt-zud4 |
| Aliases |
CVE-2025-30192
|
| Summary | An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled. |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 3.8 |
| Risk | 1.9 |
| Affected and Fixed Packages | Package Details |
| System | Score | Found at |
|---|---|---|
| epss | 0.00033 | https://api.first.org/data/v1/epss?cve=CVE-2025-30192 |
| epss | 0.00033 | https://api.first.org/data/v1/epss?cve=CVE-2025-30192 |
| epss | 0.00044 | https://api.first.org/data/v1/epss?cve=CVE-2025-30192 |
| epss | 0.00044 | https://api.first.org/data/v1/epss?cve=CVE-2025-30192 |
| epss | 0.00044 | https://api.first.org/data/v1/epss?cve=CVE-2025-30192 |
| epss | 0.00044 | https://api.first.org/data/v1/epss?cve=CVE-2025-30192 |
| epss | 0.00044 | https://api.first.org/data/v1/epss?cve=CVE-2025-30192 |
| epss | 0.00044 | https://api.first.org/data/v1/epss?cve=CVE-2025-30192 |
| cvssv3.1 | 7.5 | https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-04.html |
| ssvc | Track | https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-04.html |
| Reference id | Reference type | URL |
|---|---|---|
| https://api.first.org/data/v1/epss?cve=CVE-2025-30192 | ||
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30192 | ||
| 1109808 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109808 | |
| powerdns-advisory-2025-04.html | https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-04.html |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.09691 |
| EPSS Score | 0.00033 |
| Published At | April 2, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T16:38:32.985415+00:00 | Debian Oval Importer | Import | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 38.0.0 |