Hickory DNS is a popular Rust-based DNS client, server, and resolver used by a wide range of systems. A recent security vulnerability (CVE-2025-25188), discovered in versions starting from .8. up to .24.2, and .25.-alpha. to .25.-alpha.4, impacts users who are relying on DNSSEC verification within the client library, stub resolver, or recursive resolver. This vulnerability poses a critical risk as the DNSSEC validation routines inadvertently lead to the misplacement of trust, allowing attackers to forge DNS records and compromise the system.

Vulnerability Details ##

This security issue arises due to the treatment of entire RRsets (Resource Record sets) of DNSKEY records as trusted once trust in one of the DNSKEYs has been established. Consequently, when a zone includes a DNSKEY with a public key that matches a configured trust anchor, all keys within that same zone will be inherently trusted to authenticate other records within that zone.

There is also a second variant of this vulnerability involving DS (Delegation Signer) records. In this case, if an authenticated DS record covers one DNSKEY, it leads to trust in signatures made by an unrelated DNSKEY within the same zone.

In simpler terms, this vulnerability makes it easier for attackers to forge authenticated DNS records, potentially resulting in unauthorized access or control over a system.

Below is an example of an affected code snippet from the Hickory DNS library

fn validate_dnskey_rrset(&self, rrset: &RRset) -> Result<SecureDns, ValidationError> {
    // Assume trust in a single DNSKEY
    let trusted_key = rrset.find_trusted_key(&self.trust_anchor)?;
    
    // Incorrectly trust all keys in the RRset
    for rdata in &rrset.rdatas {
        if let RData::DNSKEY(ref dnskey) = *rdata {
            self.delegation_zone.insert_trusted_key(dnskey);
        }
    }

    Ok(SecureDns::new())
}

How to Fix the Vulnerability ##

To address this security vulnerability (CVE-2025-25188), users must upgrade their Hickory DNS to version .24.3 or .25.-alpha.5. The issue has been fixed in these versions.

- Hickory DNS v.24.3
- Hickory DNS v.25.-alpha.5

References ##

For more information on this vulnerability (CVE-2025-25188) and its implications, you can refer to the following resources:
- Hickory DNS GitHub Repository
- CVE-2025-25188 - NIST National Vulnerability Database

Conclusion ##

In conclusion, the CVE-2025-25188 security vulnerability poses a serious risk for users of Hickory DNS who rely on DNSSEC verification. It is highly recommended that affected users upgrade to the fixed versions as soon as possible to mitigate any potential attacks. Stay vigilant and ensure the security of your systems by keeping your software up to date.

Timeline

Published on: 02/10/2025 18:15:35 UTC