Acceptance of Extraneous Untrusted Data With Trusted Data Affecting unbound package, versions [1.6.2,1.23.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-UNBOUND-10875486
  • published23 Jul 2025
  • disclosed16 Jul 2025
  • creditXiang Li

Introduced: 16 Jul 2025

NewCVE-2025-5994  (opens in a new tab)
CWE-349  (opens in a new tab)

How to fix?

Upgrade unbound to version 1.23.1 or higher.

Overview

Affected versions of this package are vulnerable to Acceptance of Extraneous Untrusted Data With Trusted Data via the caching resolvers process. An attacker can send a valid query followed by non-ECS poisonous replies to try and guess the DNS transaction ID before the real answer from the upstream name server arrives.

Note:

This issue affects Unbound installations that are compiled with --enable-subnet and configured to send ECS information to upstream name servers with at least one of the send-client-subnet, client-subnet-zone or client-subnet-always-forward options.

CVSS Base Scores

version 4.0
version 3.1