Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

BIND Updates Address High-Severity Cache Poisoning Flaws

Posted on October 23, 2025October 23, 2025 By CWS

Web Methods Consortium (ISC) on Wednesday introduced BIND 9 updates that resolve high-severity vulnerabilities, together with cache poisoning flaws.

The primary challenge is a weak spot within the Pseudo Random Quantity Generator (PRNG) utilized by the favored DNS server software program that, in sure circumstances, might enable an attacker to foretell the supply port and question ID that might be used.

Attackers might abuse the safety defect, tracked as CVE-2025-40780 (CVSS rating of 8.6), in spoofing assaults that, if profitable, might lead to BIND caching attacker responses, ISC explains.

The second bug, tracked as CVE-2025-40778 (CVSS rating of 8.6), exists as a result of, “beneath sure circumstances, BIND is just too lenient when accepting data from solutions.”

This permits attackers to inject cast data into the cache, probably impacting the decision of future queries.

The third vulnerability, CVE-2025-8677 (CVSS rating of seven.5), is described as a denial-of-service (DoS) challenge that may be triggered when “querying for data inside a specifically crafted zone containing sure malformed DNSKEY data”.

An attacker might exploit the bug to overwhelm the server, impacting the efficiency and repair availability by exhausting CPU assets.

In accordance with ISC, all three flaws have an effect on resolvers however are believed to haven’t any impression on authoritative servers. No workaround is out there for any of them, however none seems to have been exploited within the wild.Commercial. Scroll to proceed studying.

The safety defects have been addressed with the discharge of BIND variations 9.18.41, 9.20.15, and 9.21.14, and BIND Supported Preview Version variations 9.18.41-S1 and 9.20.15-S1.

ISC recommends updating to a patched model of BIND as quickly as potential. Organizations counting on discontinued iterations of the DNS server ought to transition to a supported model.

Associated: Oracle Releases October 2025 Patches

Associated: BIND Updates Resolve Excessive-Severity DoS Vulnerabilities

Associated: Essential Vulnerabilities Patched in TP-Hyperlink’s Omada Gateways

Associated: ConnectWise Patches Essential Flaw in Automate RMM Device

Security Week News Tags:Address, BIND, Cache, Flaws, HighSeverity, Poisoning, Updates

Post navigation

Previous Post: Lanscope Endpoint Manager Zero-Day Exploited in the Wild
Next Post: Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process

Related Posts

In Other News: CrowdStrike Vulnerabilities, CISA Layoffs, Mango Data Breach Security Week News
Malicious NPM Packages Target Cursor AI’s macOS Users Security Week News
vBulletin Vulnerability Exploited in the Wild Security Week News
Legitimate Shellter Pen-Testing Tool Used in Malware Attacks Security Week News
US Sanctions Philippine Company for Supporting Crypto Scams Security Week News
Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control
  • Microsoft Enhances Windows Security by Turning Off File Previews for Downloads
  • North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
  • Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location
  • SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control
  • Microsoft Enhances Windows Security by Turning Off File Previews for Downloads
  • North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
  • Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location
  • SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News