Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-40778

Опубликовано: 22 окт. 2025
Источник: redhat
CVSS3: 8.6
EPSS Низкий

Описание

Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

A vulnerability exists in BIND’s DNS resolver logic that makes it overly permissive when accepting resource records (RRs) in responses. Under certain conditions, this flaw allows attackers to inject unsolicited or forged DNS records into the cache. This can be exploited to poison the resolver cache, redirecting clients to malicious domains or unauthorized servers.

Отчет

It is classified as Important rather than Critical because its impact is limited to cache poisoning within recursive resolvers and does not allow direct code execution, privilege escalation, or service disruption. The vulnerability affects the accuracy of DNS responses, but not the availability or confidentiality of systems. Additionally, DNSSEC-enabled deployments and restricted recursive access can significantly mitigate exploitation risks. Therefore, while the flaw can misdirect network traffic and compromise trust in name resolution, it does not directly compromise the underlying server or client systems, justifying an Important — but not Critical — severity rating. Technical Analysis: The issue arises because BIND fails to strictly validate unsolicited resource records accompanying legitimate DNS responses. This gap allows forged recursive resolvers to be cached as valid entries. Since the attack is remote, requires no authentication, and exploits a low-complexity vector, it is highly impactful in recursive resolver environments—especially those exposed to untrusted clients or open resolvers.

Меры по смягчению последствий

While it is not possible to eliminate risk from this vulnerability, there are several options for reducing the risk. These include restricting recursive queries to trusted or internal networks only, and apply rate limiting or firewall rules to prevent excessive or repetitive requests. Enabling DNSSEC validation helps reject forged records, while isolating recursive resolvers from authoritative servers limits the impact of potential cache poisoning. Active monitoring of CPU usage, query volume, and cache anomalies can provide early warning of abuse or attacks.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 9dhcpNot affected
Red Hat Enterprise Linux 10bindFixedRHSA-2025:1991206.11.2025
Red Hat Enterprise Linux 10bindFixedRHSA-2025:2103411.11.2025
Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONbindFixedRHSA-2025:2341417.12.2025
Red Hat Enterprise Linux 7 Extended Lifecycle SupportbindFixedRHSA-2025:2220526.11.2025
Red Hat Enterprise Linux 8bind9.16FixedRHSA-2025:1979305.11.2025
Red Hat Enterprise Linux 8bindFixedRHSA-2025:1983506.11.2025
Red Hat Enterprise Linux 8bindFixedRHSA-2025:1983506.11.2025
Red Hat Enterprise Linux 8.2 Advanced Update SupportbindFixedRHSA-2025:2174119.11.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportbindFixedRHSA-2025:2174019.11.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-347
https://bugzilla.redhat.com/show_bug.cgi?id=2405827bind: Cache poisoning attacks with unsolicited RRs

EPSS

Процентиль: 0%
0.00004
Низкий

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
5 месяцев назад

Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

CVSS3: 8.6
nvd
5 месяцев назад

Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

CVSS3: 8.6
msrc
4 месяца назад

Cache poisoning attacks with unsolicited RRs

CVSS3: 8.6
debian
5 месяцев назад

Under certain circumstances, BIND is too lenient when accepting record ...

suse-cvrf
5 месяцев назад

Security update for bind

EPSS

Процентиль: 0%
0.00004
Низкий

8.6 High

CVSS3