An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries.
The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers.
The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
                
            References
                    Configurations
                    No configuration.
History
                    21 Jul 2025, 13:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-07-21 13:15
Updated : 2025-07-22 13:06
NVD link : CVE-2025-30192
Mitre link : CVE-2025-30192
CVE.ORG link : CVE-2025-30192
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-345
                        
            Insufficient Verification of Data Authenticity
