This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.41, 9.20.15, 9.21.14, 9.18.41-S1, or 9.20.15-S1.
Workaround
No workarounds known.
Thu, 23 Oct 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-338 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 22 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 22 Oct 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | |
Title | Cache poisoning due to weak PRNG | |
Weaknesses | CWE-341 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-10-22T17:27:49.476Z
Reserved: 2025-04-16T08:44:49.857Z
Link: CVE-2025-40780

Updated: 2025-10-22T17:27:40.722Z

Status : Awaiting Analysis
Published: 2025-10-22T16:15:42.720
Modified: 2025-10-22T21:12:32.330
Link: CVE-2025-40780


No data.