Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks

Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks

Posted on October 23, 2025October 23, 2025 By CWS

The Web Methods Consortium (ISC) disclosed three high-severity vulnerabilities in BIND 9 on October 22, 2025, doubtlessly permitting distant attackers to conduct cache poisoning assaults or trigger denial-of-service (DoS) circumstances on affected DNS resolvers.

These flaws, tracked as CVE-2025-8677, CVE-2025-40778, and CVE-2025-40780, primarily influence recursive resolvers utilized by organizations for area identify decision, leaving authoritative DNS servers largely unaffected.

With BIND powering a good portion of the web’s DNS infrastructure, directors are urged to use patches instantly to mitigate dangers of service disruptions and malicious redirections.

Flaws Uncovered In Resolver Logic

CVE-2025-8677 includes useful resource exhaustion triggered by malformed DNSKEY information in specifically crafted zones, resulting in CPU overload on resolvers throughout queries.

Rated at a CVSS rating of seven.5, this vulnerability permits attackers to remotely overwhelm servers with out authentication, severely degrading efficiency for reliable customers.

ISC notes that whereas authoritative setups stay secure, resolvers in recursive mode are prime targets, echoing considerations from their information base on unintended question behaviors.

The opposite two points heart on cache poisoning, a method paying homage to the 2008 Dan Kaminsky assault that after threatened international DNS integrity.

CVE-2025-40778 (CVSS 8.6) stems from BIND’s overly permissive dealing with of unsolicited useful resource information in responses, permitting cast knowledge to infiltrate the cache and corrupt future resolutions.

Equally, CVE-2025-40780 (CVSS 8.6) exploits a weak pseudo-random quantity generator (PRNG), making supply ports and question IDs predictable for spoofing malicious replies into the cache.

Each flaws elevate the assault floor by enabling scope modifications in influence, as tainted caches may redirect site visitors throughout networks.

Researchers from Nankai College, Tsinghua College, and Hebrew College of Jerusalem recognized these points, crediting their work in ISC’s advisories.

No lively exploits are identified but, however the distant, unauthenticated nature heightens urgency given BIND’s widespread deployment.

Profitable exploitation may result in phishing, malware distribution, or man-in-the-middle assaults by diverting customers to attacker-controlled websites.

As an illustration, poisoned caches would possibly substitute reliable IP addresses with malicious ones, mimicking trusted domains and eroding consumer belief in on-line providers.

DoS from CVE-2025-8677 dangers operational downtime, monetary losses, and lowered productiveness for companies reliant on secure DNS.

Organizations utilizing weak variations spanning BIND 9.11.0 to 9.21.12 and Supported Preview Editions face elevated threats, particularly in cloud and enterprise environments.

ISC emphasizes that these vulnerabilities underscore ongoing DNS resilience challenges, even post-Kaminsky mitigations like randomized question IDs.

Distributions like Ubuntu and Pink Hat have begun issuing updates, with package deal maintainers inspired to launch patches swiftly.

Mitigations

No workarounds exist, so upgrading to fastened releases is important: BIND 9.18.41, 9.20.15, or 9.21.14 for normal branches, and corresponding Supported Preview variations.

Selective patches can be found in launch directories for these preferring minimal modifications. Directors ought to assessment ISC’s advisories and monitor for distribution updates to safeguard in opposition to these DNS threats.

As BIND evolves, such disclosures spotlight the necessity for proactive patching in crucial infrastructure.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attacks, BIND, Cache, Denial, DNS, Enable, Multiple, Poisoning, Service, Vulnerabilities

Post navigation

Previous Post: Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
Next Post: “Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

Related Posts

Hackers Actively Attacking Linux SSH Servers to Deploy TinyProxy or Sing-box Proxy Tools Hackers Actively Attacking Linux SSH Servers to Deploy TinyProxy or Sing-box Proxy Tools Cyber Security News
Firefox 149.0 Introduces Free VPN with 50GB Limit Firefox 149.0 Introduces Free VPN with 50GB Limit Cyber Security News
Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords Cyber Security News
New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control Cyber Security News
Google Urgently Updates Chrome to Fix Exploited Flaws Google Urgently Updates Chrome to Fix Exploited Flaws Cyber Security News
Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark