CVE-2026-41292 PUBLISHED

Long list of incoming EDNS options degrades performance

Assigner: NLnet Labs
Reserved: 07.05.2026 Published: 20.05.2026 Updated: 20.05.2026

NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degradation of service attack related to parsing long lists of incoming EDNS options. An adversary sending queries with too many EDNS options can hold Unbound threads hostage while they are parsing and creating internal data structures for the options. Coordinated attacks can result in degradation and/or denial of service. Unbound 1.25.1 contains a patch with a fix to limit acceptable incoming EDNS options (100).

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Red
CVSS Score: 6.6

Product Status

Vendor NLnet Labs
Product Unbound
Versions Default: unaffected
  • affected from 0 to 1.25.1 (excl.)

Solutions

This issue is fixed starting with version 1.25.1

Credits

  • GitHub user N0zoM1z0 finder
  • Qifan Zhang (Palo Alto Networks) finder

References

Problem Types

  • CWE-407: Inefficient Algorithmic Complexity CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling CWE