Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2026-41292— Long list of incoming EDNS options degrades performance

AI Predicted 7.5 Difficulty: Easy EPSS 0.06% · P18

Affected Version Matrix 1

VendorProductVersion RangeStatus
NLnet LabsUnbound< 1.25.1affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-41292

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Long list of incoming EDNS options degrades performance
Source: NVD (National Vulnerability Database)
Vulnerability Description
NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degradation of service attack related to parsing long lists of incoming EDNS options. An adversary sending queries with too many EDNS options can hold Unbound threads hostage while they are parsing and creating internal data structures for the options. Coordinated attacks can result in degradation and/or denial of service. Unbound 1.25.1 contains a patch with a fix to limit acceptable incoming EDNS options (100).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
算法复杂性
Source: NVD (National Vulnerability Database)
Vulnerability Title
NLnet Labs Unbound 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
NLnet Labs Unbound是NLnet Labs开源的一个高性能DNS解析器。 NLnet Labs Unbound 1.25.0及之前版本存在安全漏洞,该漏洞源于解析大量传入EDNS选项时可能导致服务降级,攻击者发送过多EDNS选项的查询可占用Unbound线程,协调攻击可能导致降级或拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
NLnet LabsUnbound 0 ~ 1.25.1 -

II. Public POCs for CVE-2026-41292

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-41292

登录查看更多情报信息。

Vendor Advisories for CVE-2026-41292 (1)

Same Patch Batch · NLnet Labs · 2026-05-20 · 11 CVEs total

CVE-2026-42959Crash during DNSSEC validation of malicious content
CVE-2026-42923Degradation of service with unbounded NSEC3 hash calculations
CVE-2026-42944Heap overflow with multiple NSID, COOKIE, PADDING EDNS options
CVE-2026-42960Possible cache poisoning via promiscuous records for the authority section
CVE-2026-42534Jostle logic bypass degrades resolution performance
CVE-2026-32792Packet of death with DNSCrypt
CVE-2026-40622Another 'ghost domain names' attack variant
CVE-2026-44390Unbounded name compression in certain cases causes degradation of service
CVE-2026-44608Use after free and crash under special conditions in RPZ code
CVE-2026-33278Possible arbitrary code execution during DNSSEC validation

IV. Related Vulnerabilities

V. Comments for CVE-2026-41292

No comments yet


Leave a comment