PatchSiren cyber security CVE debrief
CVE-2026-32792 NLnet Labs CVE debrief
CVE-2026-32792 affects NLnet Labs Unbound versions 1.6.2 through 1.25.0 when compiled with DNSCrypt support (--enable-dnscrypt). According to the vendor and NVD, a single malformed DNSCrypt query whose decrypted plaintext is all 0x00 bytes and lacks the expected 0x80 marker can underflow the packet-reading logic, potentially causing a heap overflow and a crash. NLnet Labs states that version 1.25.1 fixes the issue by bounding reads to the available buffer space.
- Vendor
- NLnet Labs
- Product
- Unbound
- CVSS
- MEDIUM 4.6
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-20
- Original CVE updated
- 2026-05-20
- Advisory published
- 2026-05-20
- Advisory updated
- 2026-05-20
Who should care
Operators running Unbound with DNSCrypt enabled should prioritize this advisory, especially if the resolver accepts untrusted network traffic. Package maintainers and appliance vendors shipping affected Unbound builds should also verify whether their builds include DNSCrypt support and whether they need to roll out the fixed release.
Technical summary
NVD classifies the issue as network-exploitable with no privileges or user interaction required and rates it 4.6 (Medium). The flaw is a memory-safety problem in DNSCrypt packet parsing: a malformed decrypted payload can make Unbound read beyond the intended buffer while searching for a marker byte, which may lead to heap overflow and then a crash depending on allocator behavior and memory layout. If overflow does not occur, later packet checks may reject the packet. The affected range is Unbound 1.6.2 through 1.25.0, and the fix is in 1.25.1.
Defensive priority
Medium priority: patch promptly if DNSCrypt support is enabled, because the issue is remotely triggerable and can cause denial of service, but the vendor notes the crash likelihood is low and depends on heap layout.
Recommended defensive actions
- Upgrade Unbound to 1.25.1 or later.
- Verify whether your Unbound build was compiled with DNSCrypt support (--enable-dnscrypt).
- If you cannot upgrade immediately, remove or disable DNSCrypt support where operationally feasible.
- Check package/vendor releases for backported fixes if you rely on distribution builds.
- Monitor affected resolvers for unexpected crashes or restarts until patched.
Evidence notes
This debrief is based on the official NVD record for CVE-2026-32792 and the linked NLnet Labs vendor advisory. NVD marks the vulnerability as analyzed, lists affected Unbound versions from 1.6.2 up to but not including 1.25.1, and includes the vendor reference dated the same publication day as the CVE.
Official resources
-
CVE-2026-32792 CVE record
CVE.org
-
CVE-2026-32792 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mitigation, Vendor Advisory
The CVE was published on 2026-05-20 and last modified on 2026-05-20. The vendor advisory referenced by NVD was also published on 2026-05-20, and the fixed version is Unbound 1.25.1.