Home

Description

Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-22 | Updated 2025-10-27 | Assigner isc




HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

Problem types

CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data

Product status

Default status
unaffected

9.11.0 (custom)
affected

9.18.0 (custom)
affected

9.20.0 (custom)
affected

9.21.0 (custom)
affected

9.11.3-S1 (custom)
affected

9.18.11-S1 (custom)
affected

9.20.9-S1 (custom)
affected

Credits

ISC would like to thank Yuxiao Wu, Yunyi Zhang, Baojun Liu, and Haixin Duan from Tsinghua University for bringing this vulnerability to our attention.

References

kb.isc.org/docs/cve-2025-40778 (CVE-2025-40778) vendor-advisory

cve.org (CVE-2025-40778)

nvd.nist.gov (CVE-2025-40778)

Download JSON