CVE-2026-41292

HIGHNVD 7.5Soon
EchelonGraph scoreLOW confidence

This medium-severity CVE scores 6.6 under NVD CVSS v3. EPSS exploit-prediction score not yet available (the EPSS model rescores nightly; freshly-published CVEs typically appear within 48 hours). GitHub Security Advisory data not yet ingested — confidence will rise once GHSA publishes (typical lag: hours to days for open-source ecosystem CVEs; never for infrastructure-only CVEs).

Triggered by: NVD CVSS baseline
Sources: nvd
7.5

NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degradation of service attack related to parsing long lists of incoming EDNS options. An adversary sending queries with too many EDNS options can hold Unbound threads hostage while they are parsing and creating internal data structures for the options. Coordinated attacks can result in degradation and/or denial of service. Unbound 1.25.1 contains a patch with a fix to limit acceptable incoming EDNS options (100).

CVSS v3
7.5
EG Score
6.6(low)
EPSS
17.9%
KEV
Not listed

Published

May 20, 2026

Last Modified

May 20, 2026

Frequently asked(5)

What is CVE-2026-41292?
CVE-2026-41292 is a high vulnerability published on May 20, 2026. NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degradation of service attack related to parsing long lists of incoming EDNS options. An adversary sending queries with too many EDNS options can hold Unbound threads hostage while they are parsing and creating internal data…
When was CVE-2026-41292 disclosed?
CVE-2026-41292 was first published in the National Vulnerability Database on May 20, 2026. EchelonGraph re-ingests CVE updates from NVD on a 2-hour cycle, so this page reflects the latest published state.
Is CVE-2026-41292 actively exploited?
CVE-2026-41292 is not currently on CISA's Known Exploited Vulnerabilities catalog. FIRST EPSS estimates a 17.9% percentile likelihood of exploitation in the next 30 days — higher percentiles indicate greater predicted risk.
What is the CVSS score of CVE-2026-41292?
CVE-2026-41292 has a CVSS v3 base score of 7.5 (NVD). EchelonGraph synthesises NVD + CISA KEV + FIRST EPSS + GHSA into a combined EG score of 6.6. The EG score is currently aggregating — additional source signals are being incorporated as they become available..
How do I remediate CVE-2026-41292?
Patch to the fixed version published by the affected vendor. Where vendor advisories exist for CVE-2026-41292, EchelonGraph cross-links them in the Vendor Advisories panel below — those typically contain the canonical remediation steps, fixed version numbers, and any vendor-specific mitigations.

Dependency Blast Radius

See which npm, PyPI, Go, and Maven packages are affected by CVE-2026-41292

Explore →

Is Your Infrastructure Affected by CVE-2026-41292?

EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.