Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks

Posted on October 23, 2025October 23, 2025 By CWS

The Web Methods Consortium (ISC) disclosed three high-severity vulnerabilities in BIND 9 on October 22, 2025, doubtlessly permitting distant attackers to conduct cache poisoning assaults or trigger denial-of-service (DoS) circumstances on affected DNS resolvers.

These flaws, tracked as CVE-2025-8677, CVE-2025-40778, and CVE-2025-40780, primarily influence recursive resolvers utilized by organizations for area identify decision, leaving authoritative DNS servers largely unaffected.

With BIND powering a good portion of the web’s DNS infrastructure, directors are urged to use patches instantly to mitigate dangers of service disruptions and malicious redirections.

Flaws Uncovered In Resolver Logic

CVE-2025-8677 includes useful resource exhaustion triggered by malformed DNSKEY information in specifically crafted zones, resulting in CPU overload on resolvers throughout queries.

Rated at a CVSS rating of seven.5, this vulnerability permits attackers to remotely overwhelm servers with out authentication, severely degrading efficiency for reliable customers.

ISC notes that whereas authoritative setups stay secure, resolvers in recursive mode are prime targets, echoing considerations from their information base on unintended question behaviors.

The opposite two points heart on cache poisoning, a method paying homage to the 2008 Dan Kaminsky assault that after threatened international DNS integrity.

CVE-2025-40778 (CVSS 8.6) stems from BIND’s overly permissive dealing with of unsolicited useful resource information in responses, permitting cast knowledge to infiltrate the cache and corrupt future resolutions.

Equally, CVE-2025-40780 (CVSS 8.6) exploits a weak pseudo-random quantity generator (PRNG), making supply ports and question IDs predictable for spoofing malicious replies into the cache.

Each flaws elevate the assault floor by enabling scope modifications in influence, as tainted caches may redirect site visitors throughout networks.

Researchers from Nankai College, Tsinghua College, and Hebrew College of Jerusalem recognized these points, crediting their work in ISC’s advisories.

No lively exploits are identified but, however the distant, unauthenticated nature heightens urgency given BIND’s widespread deployment.

Profitable exploitation may result in phishing, malware distribution, or man-in-the-middle assaults by diverting customers to attacker-controlled websites.

As an illustration, poisoned caches would possibly substitute reliable IP addresses with malicious ones, mimicking trusted domains and eroding consumer belief in on-line providers.

DoS from CVE-2025-8677 dangers operational downtime, monetary losses, and lowered productiveness for companies reliant on secure DNS.

Organizations utilizing weak variations spanning BIND 9.11.0 to 9.21.12 and Supported Preview Editions face elevated threats, particularly in cloud and enterprise environments.

ISC emphasizes that these vulnerabilities underscore ongoing DNS resilience challenges, even post-Kaminsky mitigations like randomized question IDs.

Distributions like Ubuntu and Pink Hat have begun issuing updates, with package deal maintainers inspired to launch patches swiftly.

Mitigations

No workarounds exist, so upgrading to fastened releases is important: BIND 9.18.41, 9.20.15, or 9.21.14 for normal branches, and corresponding Supported Preview variations.

Selective patches can be found in launch directories for these preferring minimal modifications. Directors ought to assessment ISC’s advisories and monitor for distribution updates to safeguard in opposition to these DNS threats.

As BIND evolves, such disclosures spotlight the necessity for proactive patching in crucial infrastructure.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attacks, BIND, Cache, Denial, DNS, Enable, Multiple, Poisoning, Service, Vulnerabilities

Post navigation

Previous Post: Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
Next Post: “Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

Related Posts

New Scraper Botnet with 3,600+ Unique Devices Attacking Targets in US and UK Cyber Security News
What You Need to Pay Attention to Right Now  Cyber Security News
New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards Cyber Security News
How to Radically Cut Response Time for Each Security Incident  Cyber Security News
Google Warns of Cybercriminals Increasingly Attacking US Users to Steal Login Credentials Cyber Security News
Scattered Lapsus$ Hunters Claim to Have Stolen More Than 1 Billion Salesforce Records Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk
  • Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild
  • Secure AI at Scale and Speed — Learn the Framework in this Free Webinar
  • CISA Warns of Motex LANSCOPE Endpoint Manager Vulnerability Exploited in Attacks
  • $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk
  • Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild
  • Secure AI at Scale and Speed — Learn the Framework in this Free Webinar
  • CISA Warns of Motex LANSCOPE Endpoint Manager Vulnerability Exploited in Attacks
  • $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News