This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.41, 9.20.15, 9.21.14, 9.18.41-S1, or 9.20.15-S1.
Workaround
No workarounds known.
Thu, 23 Oct 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-347 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 22 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 22 Oct 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | |
Title | Cache poisoning attacks with unsolicited RRs | |
Weaknesses | CWE-349 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-10-22T17:32:02.211Z
Reserved: 2025-04-16T08:44:49.857Z
Link: CVE-2025-40778

Updated: 2025-10-22T17:31:50.749Z

Status : Awaiting Analysis
Published: 2025-10-22T16:15:42.520
Modified: 2025-10-22T21:12:32.330
Link: CVE-2025-40778


No data.