A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Jul 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 16 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Jul 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies. | |
Title | Cache poisoning via the ECS-enabled Rebirthday Attack | |
Weaknesses | CWE-349 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: NLnet Labs
Published: 2025-07-16T14:38:22.738Z
Updated: 2025-07-16T15:42:18.657Z
Reserved: 2025-06-11T09:08:05.767Z
Link: CVE-2025-5994

Updated: 2025-07-16T15:42:16.296Z

Status : Awaiting Analysis
Published: 2025-07-16T15:15:33.490
Modified: 2025-07-17T21:15:50.197
Link: CVE-2025-5994
