Cyber Posture

CVE-2026-33602

Medium

Published: 22 April 2026

Published
22 April 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
EPSS Score 0.0001 0.4th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33602 is a medium-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Powerdns Dnsdist. Its CVSS base score is 6.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 0.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation requires applying vendor patches for dnsdist, directly eliminating the out-of-bounds write vulnerability from crafted UDP responses.

prevent

Memory protection mechanisms like stack canaries and address space layout randomization prevent crashes from out-of-bounds writes triggered by malformed query IDs.

prevent

Information input validation enforces checks on query IDs in UDP responses from backends to reject off-by-one values before processing.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Out-of-bounds write in dnsdist from rogue backend crafted UDP response directly enables application/system exploitation for endpoint DoS (crash/disruption of DNS service).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A rogue backend can send a crafted UDP response with a query ID off by one related to the maximum configured value, triggering an out-of-bounds write leading to a denial of service.

Deeper analysisAI

CVE-2026-33602 affects dnsdist, the DNS load balancer from PowerDNS. The vulnerability is an out-of-bounds write (CWE-122) triggered when a rogue backend sends a crafted UDP response with a query ID off by one relative to the maximum configured value. Published on 2026-04-22, it carries a CVSS v3.1 base score of 6.5 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H), indicating medium severity with network accessibility, high attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, low integrity impact, and high availability impact.

An attacker positioned as a rogue backend server that dnsdist queries can exploit this vulnerability remotely over the network. The high complexity arises from crafting the specific UDP response with the manipulated query ID. Exploitation results in an out-of-bounds write, leading to a denial of service, potentially crashing the dnsdist process and disrupting DNS resolution services.

The PowerDNS security advisory provides details on mitigation and patches; refer to https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html for guidance.

Details

CWE(s)

Affected Products

powerdns
dnsdist
1.9.0 — 1.9.13 · 2.0.0 — 2.0.4

CVEs Like This One

CVE-2026-33597Same product: Powerdns Dnsdist
CVE-2026-27853Same product: Powerdns Dnsdist
CVE-2026-33593Same product: Powerdns Dnsdist
CVE-2026-33595Same product: Powerdns Dnsdist
CVE-2026-33599Same product: Powerdns Dnsdist
CVE-2026-24030Same product: Powerdns Dnsdist
CVE-2026-27854Same product: Powerdns Dnsdist
CVE-2026-33598Same product: Powerdns Dnsdist
CVE-2026-33254Same product: Powerdns Dnsdist
CVE-2026-24028Same product: Powerdns Dnsdist

References