Cyber Posture

CVE-2025-50334

HighPublic PoC

Published: 08 January 2026

Published
08 January 2026
Modified
12 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0019 40.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-50334 is a high-severity Allocation of Resources Without Limits or Throttling (CWE-770) vulnerability in Technitium Dnsserver. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 40.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-770

This control implements explicit throttling on session allocation, addressing the weakness of allocating resources without limits.

addresses: CWE-770

Plan testing exercises resource allocation limits and throttling during simulated failures, directly addressing weaknesses that allow unbounded resource use.

addresses: CWE-770

Contingency plan updates ensure recovery strategies address unbounded resource allocation, making it harder for attackers to exploit lack of throttling to cause prolonged outages.

addresses: CWE-770

Provides continuity when unbounded resource allocation at the primary site leads to exhaustion and downtime.

addresses: CWE-770

Alternate services allow operations to continue when primary allocation of resources lacks limits or throttling.

addresses: CWE-770

Explicit planning of security-related actions requires defining limits, windows, and resource allocations, making allocation without throttling far less likely.

addresses: CWE-770

Measures of performance include tracking allocation behavior and throttling effectiveness, reducing the window for resource exhaustion attacks.

addresses: CWE-770

Imposes an inactivity-based limit on network resource allocation, throttling the number of concurrently held connections.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Direct remote exploitation of rate-limiting flaw (CWE-770) in DNS server enables application/service DoS via T1499.004.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a denial of service via the rate-limiting component

Deeper analysisAI

CVE-2025-50334 is a denial-of-service vulnerability in Technitium DNS Server version 13.5. The flaw exists in the rate-limiting component, enabling a remote attacker to trigger a DoS condition. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is linked to CWE-770 (Allocation of Resources Without Limits or Throttling). The vulnerability was published on 2026-01-08.

The attack requires network access and can be carried out remotely by an unauthenticated attacker with low complexity and no user interaction. Exploitation leads to high-impact disruption of availability, potentially rendering the DNS server unresponsive, while confidentiality and integrity remain unaffected.

Mitigation guidance appears in referenced advisories and resources, including the Technitium website at http://technitium.com, a GitHub security advisory at https://github.com/FPokerFace/Security-Advisory/tree/main/CVE-2025-50334, the DnsServer CHANGELOG at https://github.com/TechnitiumSoftware/DnsServer/blob/master/CHANGELOG.md, vulnerable source code at https://github.com/TechnitiumSoftware/DnsServer/blob/v13.3/DnsServerCore/Dns/DnsServer.cs, and a related commit at https://github.com/TechnitiumSoftware/DnsServer/commit/7229b217238213cc6275eea68a7e17d73df1603e. Security practitioners should consult these for patch details and upgrade recommendations.

Details

CWE(s)

Affected Products

technitium
dnsserver
≤ 14.0

CVEs Like This One

CVE-2026-42255Same product: Technitium Dnsserver
CVE-2026-33256Shared CWE-770
CVE-2026-26313Shared CWE-770
CVE-2025-27219Shared CWE-770
CVE-2026-24458Shared CWE-770
CVE-2025-68136Shared CWE-770
CVE-2026-3260Shared CWE-770
CVE-2026-34513Shared CWE-770
CVE-2026-5438Shared CWE-770
CVE-2025-21521Shared CWE-770

References