PowerDNS has released a critical update to address a high-severity vulnerability in its DNS proxy and load balancer, DNSdist, that could allow unauthenticated attackers to cause service disruptions through specially crafted TCP connections. The vulnerability, tracked as CVE-2025-30193 with a CVSS score of 7.5, affects all DNSdist versions before 1.9.10 released on May 20, 2025. […]
The post PowerDNS Vulnerability Let Attackers Trigger DoS Attack Via Malicious TCP Connection appeared first on Cyber Security News.
This article has been indexed from Cyber Security News