CVE-2026-40622 PUBLISHED

Another 'ghost domain names' attack variant

Assigner: NLnet Labs
Reserved: 07.05.2026 Published: 20.05.2026 Updated: 20.05.2026

NLnet Labs Unbound 1.16.2 up to and including version 1.25.0 has a vulnerability of the 'ghost domain names' family of attacks that could extend the ghost domain window by up to one cached TTL configured value. Similar to other 'ghost domain names' attacks, an adversary needs to control a (ghost) zone and be able to query a vulnerable Unbound. A single client NS query can cause Unbound to overwrite the cached expired parent-side referral NS rrset with the child-side apex NS rrset and essentially extend the ghost domain window by up to one cached TTL configured value ('cache-max-ttl'). In configurations where 'harden-referral-path: yes' is used (non-default configuration), no client NS query is required since Unbound implicitly performs that query. Unbound 1.25.1 contains a patch with a fix that does not allow extension of TTLs for (parent) NS records regardless of their trust.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber
CVSS Score: 6.6

Product Status

Vendor NLnet Labs
Product Unbound
Versions Default: unaffected
  • affected from 1.16.2 to 1.25.1 (excl.)

Solutions

This issue is fixed starting with version 1.25.1

Credits

  • Qifan Zhang (Palo Alto Networks) finder

References