dnsdist CVE-2026-33593

| EUVD-2026-24929 HIGH
Divide By Zero (CWE-369)
2026-04-22 [email protected]
7.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Patch available
Apr 22, 2026 - 16:33 EUVD
Re-analysis Queued
Apr 22, 2026 - 15:22 vuln.today
cvss_changed
Analysis Generated
Apr 22, 2026 - 14:59 vuln.today

DescriptionNVD

A client can trigger a divide by zero error leading to crash by sending a crafted DNSCrypt query.

AnalysisAI

Remote denial of service in dnsdist allows unauthenticated attackers to crash the DNS load balancer by sending specially crafted DNSCrypt queries that trigger a divide-by-zero error. The vulnerability requires no authentication, low attack complexity, and directly impacts service availability for all DNS traffic routed through affected dnsdist instances. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Audit all dnsdist instances for DNSCrypt protocol enablement and document affected systems; assess current DNS redundancy architecture to identify single points of failure. Within 7 days: Disable DNSCrypt protocol support on all dnsdist instances if business requirements permit, or implement network-level ingress filtering to restrict DNSCrypt traffic to trusted sources only. …

Sign in for detailed remediation steps.

Share

CVE-2026-33593 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy