PT-2025-43372 · Isc +9 · Bind +9

Published

2025-10-22

·

Updated

2025-12-31

·

CVE-2025-40778

CVSS v3.1
8.6
VectorAV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
Name of the Vulnerable Software and Affected Versions BIND versions 9.11.0 through 9.16.50 BIND versions 9.18.0 through 9.18.39 BIND versions 9.20.0 through 9.20.13 BIND versions 9.21.0 through 9.21.12 BIND Supported Preview Edition versions 9.11.3-S1 through 9.16.50-S1 BIND Supported Preview Edition versions 9.18.11-S1 through 9.18.39-S1 BIND Supported Preview Edition versions 9.20.9-S1 through 9.20.13-S1
Description BIND is susceptible to a cache poisoning issue where it improperly handles DNS responses, allowing attackers to inject forged data into the cache. This can lead to redirection of users to malicious sites without their knowledge, potentially enabling phishing attacks, credential theft, and malware distribution. A proof-of-concept exploit is publicly available. Over 706,000 systems and potentially up to 5,900 exposed instances are estimated to be vulnerable. The issue occurs when BIND accepts unsolicited resource records, violating standard DNS security principles. The vulnerability allows off-path attackers to manipulate DNS resolution, potentially redirecting traffic to attacker-controlled infrastructure. The
forwarders
component is involved in the vulnerability.
Recommendations Upgrade to BIND version 9.18.41 Upgrade to BIND version 9.20.15 Upgrade to BIND version 9.21.14 or later Upgrade to BIND Supported Preview Edition version 9.18.41-S1 Upgrade to BIND Supported Preview Edition version 9.20.15-S1 Restrict recursion to trusted clients Enable DNSSEC validation

Exploit

Fix

DoS

Weakness Enumeration

Related Identifiers

ALSA-2025:19793
ALSA-2025:19835
ALSA-2025:19912
ALSA-2025:21034
ALSA-2025:21111
ALSA-2025_19793
ALSA-2025_19835
ALSA-2025_19950
ALSA-2025_21110
ALSA-2025_21111
ALT-PU-2025-13369
ALT-PU-2025-13412
BDU:2025-13637
CESA-2025_19793
CESA-2025_19835
CVE-2025-40778
DLA-4364-1
DSA-6033-1
INFSA-2025_19793
INFSA-2025_19835
INFSA-2025_21110
INFSA-2025_21111
MGASA-2025-0254
OESA-2025-2653
OESA-2025-2654
OESA-2025-2759
RHSA-2025:19793
RHSA-2025:19835
RHSA-2025:19912
RHSA-2025:19950
RHSA-2025:19951
RHSA-2025:21034
RHSA-2025:21110
RHSA-2025:21111
RHSA-2025:21817
RHSA-2025:21887
RHSA-2025:22205
RHSA-2025_19793
RHSA-2025_19835
RHSA-2025_19950
RHSA-2025_19951
RHSA-2025_21110
RHSA-2025_21111
SUSE-SU-2025:4107-1
SUSE-SU-2025:4108-1
SUSE-SU-2025:4109-1
SUSE-SU-2025:4110-1
SUSE-SU-2025_3903-1
SUSE-SU-2025_3976-1
SUSE-SU-2025_4107-1
SUSE-SU-2025_4108-1
SUSE-SU-2025_4109-1
SUSE-SU-2025_4110-1
USN-7836-1
USN-7836-2

Affected Products

Alt Linux
Almalinux
Bind
Centos
Linuxmint
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu