CVE-2026-42960
NLnet Labs · Unbound
NLnet Labs Unbound is vulnerable to cache poisoning via promiscuous RRSets in the authority section of DNS replies, allowing attackers to inject malicious records into the cache.
Executive summary
A critical cache poisoning vulnerability in NLnet Labs Unbound allows attackers to redirect traffic by injecting malicious DNS records into the resolver's cache.
Vulnerability
This is a DNS cache poisoning vulnerability. An attacker can exploit this by crafting malicious DNS replies—via spoofing or fragmentation—that force the resolver to cache unauthorized address records.
Business impact
Successful exploitation allows an adversary to redirect legitimate user traffic to malicious infrastructure, facilitating man-in-the-middle attacks, credential theft, and malware distribution. With a CVSS score of 10.0, this flaw poses a severe risk to the integrity of DNS resolution services across the enterprise.
Remediation
Immediate Action: Upgrade to Unbound version 1.25.1 or later immediately.
Proactive Monitoring: Monitor DNS query traffic for unexpected resolution patterns or signs of cache poisoning attempts.
Compensating Controls: Use DNSSEC validation where possible and ensure the resolver is not reachable from untrusted networks to limit the scope of potential spoofing attacks.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The risk of DNS cache poisoning is critical. Administrators must update to the patched version of Unbound to ensure that the resolver correctly validates additional section records and rejects malicious data.