PT-2026-27775 · Isc · Bind

Published

2026-03-25

·

Updated

2026-03-25

·

CVE-2026-3591

CVSS v3.1

5.4

Medium

AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Name of the Vulnerable Software and Affected Versions BIND versions 9.20.0 through 9.20.20 BIND versions 9.21.0 through 9.21.19 BIND versions 9.20.9-S1 through 9.20.20-S1
Description A use-after-return issue exists in the named server when processing DNS queries signed with SIG(0). A crafted DNS request could cause an Access Control List (ACL) to incorrectly match an IP address. In a default-allow ACL, this may result in unauthorized access.
Recommendations Update BIND to a version later than 9.20.20. Update BIND to a version later than 9.21.19. Update BIND to a version later than 9.20.20-S1.

Fix

Weakness Enumeration

Related Identifiers

CVE-2026-3591

Affected Products

Bind