CVE-2025-11411

Public on 2025-10-22
Modified on 2025-11-19
Description
NLnet Labs Unbound up to and including version 1.24.0 is vulnerable to possible domain hijack attacks. Promiscuous NS RRSets that complement positive DNS replies in the authority section can be used to trick resolvers to update their delegation information for the zone. Usually these RRSets are used to update the resolver's knowledge of the zone's name servers. A malicious actor can exploit the possible poisonous effect by injecting NS RRSets (and possibly their respective address records) in a reply. This could be done for example by trying to spoof a packet or fragmentation attacks. Unbound would then proceed to update the NS RRSet data it already has since the new data has enough trust for it, i.e., in-zone data for the delegation point. Unbound 1.24.1 includes a fix that scrubs unsolicited NS RRSets (and their respective address records) from replies mitigating the possible poison effect.

unbound-1.7.3-15.amzn2.0.11 for AL2, unbound-1.17.0-2.amzn2.0.8 for AL2 extras and unbound-1.17.1-1.amzn2023.0.9 for AL2023 introduce a new configuration iter-scrub-promiscuous in order to fix CVE-2025-11411.
We recommend not disabling the config iter-scrub-promiscuous which is enabled by default in order to protect against the vulnerability
Severity
Medium severity
Medium
See what this means
CVSS v3 Base Score
5.9
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Core unbound 2025-12-08 ALAS2-2025-3095 Fixed
Amazon Linux 2 - Unbound1.17 Extra unbound 2025-12-08 ALAS2UNBOUND-1.17-2025-007 Fixed
Amazon Linux 2023 unbound 2025-12-08 ALAS2023-2025-1315 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N