CVE-2026-42923 PUBLISHED

Degradation of service with unbounded NSEC3 hash calculations

Assigner: NLnet Labs
Reserved: 07.05.2026 Published: 20.05.2026 Updated: 20.05.2026

NLnet Labs Unbound up to and including version 1.25.0 has a vulnerability in the DNSSEC validator where the code path to consult the negative cache for DS records does not take into account the limit on NSEC3 hash calculations introduced in 1.19.1. This leads to degradation of service during the attack. An adversary that controls a DNSSEC signed zone can exploit this by signing NSEC3 records with acceptably high iterations for child delegations and querying a vulnerable Unbound. Unbound will keep performing the allowed hash calculations on the NSEC3 records and will not limit the work by the mitigation introduced in 1.19.1. As a side effect, a global lock for the negative cache will be held for the duration of the hashing, blocking other threads that need to consult the negative cache. Coordinated attacks could raise the vulnerability to denial of service. Unbound 1.25.1 contains a patch with a fix to bound the vulnerable code path with the existing limit for NSEC3 hash calculations.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/U:Amber
CVSS Score: 6.9

Product Status

Vendor NLnet Labs
Product Unbound
Versions Default: unaffected
  • affected from 0 to 1.25.1 (excl.)

Solutions

This issue is fixed starting with version 1.25.1

Credits

  • Qifan Zhang (Palo Alto Networks) finder

References

Problem Types

  • CWE-407: Inefficient Algorithmic Complexity CWE