Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

BIND Updates Address High-Severity Cache Poisoning Flaws

The vulnerabilities allow attackers to predict source ports and query IDs BIND will use, and to inject forged records into the cache.

DNS Vulnerabilities

Internet Systems Consortium (ISC) on Wednesday announced BIND 9 updates that resolve high-severity vulnerabilities, including cache poisoning flaws.

The first issue is a weakness in the Pseudo Random Number Generator (PRNG) used by the popular DNS server software that, in certain circumstances, could allow an attacker to predict the source port and query ID that will be used.

Attackers could abuse the security defect, tracked as CVE-2025-40780 (CVSS score of 8.6), in spoofing attacks that, if successful, could result in BIND caching attacker responses, ISC explains.

The second bug, tracked as CVE-2025-40778 (CVSS score of 8.6), exists because, “under certain circumstances, BIND is too lenient when accepting records from answers.”

This allows attackers to inject forged records into the cache, potentially impacting the resolution of future queries.

The third vulnerability, CVE-2025-8677 (CVSS score of 7.5), is described as a denial-of-service (DoS) issue that can be triggered when “querying for records within a specially crafted zone containing certain malformed DNSKEY records”.

Advertisement. Scroll to continue reading.

An attacker could exploit the bug to overwhelm the server, impacting the performance and service availability by exhausting CPU resources.

According to ISC, all three flaws affect resolvers but are believed to have no impact on authoritative servers. No workaround is available for any of them, but none appears to have been exploited in the wild.

The security defects have been addressed with the release of BIND versions 9.18.41, 9.20.15, and 9.21.14, and BIND Supported Preview Edition versions 9.18.41-S1 and 9.20.15-S1.

ISC recommends updating to a patched version of BIND as soon as possible. Organizations relying on discontinued iterations of the DNS server should transition to a supported version.

Related: Oracle Releases October 2025 Patches

Related: BIND Updates Resolve High-Severity DoS Vulnerabilities

Related: Critical Vulnerabilities Patched in TP-Link’s Omada Gateways

Related: ConnectWise Patches Critical Flaw in Automate RMM Tool

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Anti-ransomware platform Halcyon has named Kirstjen Nielsen and Chris Inglis as Strategic Advisors.

ThreatModeler has appointed Kevin Gallagher as Chief Executive Officer.

Thomas Bain has been appointed Chief Marketing Officer at Silent Push.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.