We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A `named` caching resolver that is configured to send ECS (EDNS Client Subnet) options may be vulnerable to a cache-poisoning attack. This issue affects BIND 9 versions 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.37-S1, and 9.20.9-S1 through 9.20.10-S1.
Reserved 2025-04-16 | Published 2025-07-16 | Updated 2025-07-16 | Assigner iscCWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data
ISC would like to thank Xiang Li from AOSP Lab of Nankai University for bringing this vulnerability to our attention.
kb.isc.org/docs/cve-2025-40776 (CVE-2025-40776)
Support options