Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks

Posted on October 23, 2025October 23, 2025 By CWS

The Web Methods Consortium (ISC) disclosed three high-severity vulnerabilities in BIND 9 on October 22, 2025, doubtlessly permitting distant attackers to conduct cache poisoning assaults or trigger denial-of-service (DoS) circumstances on affected DNS resolvers.

These flaws, tracked as CVE-2025-8677, CVE-2025-40778, and CVE-2025-40780, primarily influence recursive resolvers utilized by organizations for area identify decision, leaving authoritative DNS servers largely unaffected.

With BIND powering a good portion of the web’s DNS infrastructure, directors are urged to use patches instantly to mitigate dangers of service disruptions and malicious redirections.

Flaws Uncovered In Resolver Logic

CVE-2025-8677 includes useful resource exhaustion triggered by malformed DNSKEY information in specifically crafted zones, resulting in CPU overload on resolvers throughout queries.

Rated at a CVSS rating of seven.5, this vulnerability permits attackers to remotely overwhelm servers with out authentication, severely degrading efficiency for reliable customers.

ISC notes that whereas authoritative setups stay secure, resolvers in recursive mode are prime targets, echoing considerations from their information base on unintended question behaviors.

The opposite two points heart on cache poisoning, a method paying homage to the 2008 Dan Kaminsky assault that after threatened international DNS integrity.

CVE-2025-40778 (CVSS 8.6) stems from BIND’s overly permissive dealing with of unsolicited useful resource information in responses, permitting cast knowledge to infiltrate the cache and corrupt future resolutions.

Equally, CVE-2025-40780 (CVSS 8.6) exploits a weak pseudo-random quantity generator (PRNG), making supply ports and question IDs predictable for spoofing malicious replies into the cache.

Each flaws elevate the assault floor by enabling scope modifications in influence, as tainted caches may redirect site visitors throughout networks.

Researchers from Nankai College, Tsinghua College, and Hebrew College of Jerusalem recognized these points, crediting their work in ISC’s advisories.

No lively exploits are identified but, however the distant, unauthenticated nature heightens urgency given BIND’s widespread deployment.

Profitable exploitation may result in phishing, malware distribution, or man-in-the-middle assaults by diverting customers to attacker-controlled websites.

As an illustration, poisoned caches would possibly substitute reliable IP addresses with malicious ones, mimicking trusted domains and eroding consumer belief in on-line providers.

DoS from CVE-2025-8677 dangers operational downtime, monetary losses, and lowered productiveness for companies reliant on secure DNS.

Organizations utilizing weak variations spanning BIND 9.11.0 to 9.21.12 and Supported Preview Editions face elevated threats, particularly in cloud and enterprise environments.

ISC emphasizes that these vulnerabilities underscore ongoing DNS resilience challenges, even post-Kaminsky mitigations like randomized question IDs.

Distributions like Ubuntu and Pink Hat have begun issuing updates, with package deal maintainers inspired to launch patches swiftly.

Mitigations

No workarounds exist, so upgrading to fastened releases is important: BIND 9.18.41, 9.20.15, or 9.21.14 for normal branches, and corresponding Supported Preview variations.

Selective patches can be found in launch directories for these preferring minimal modifications. Directors ought to assessment ISC’s advisories and monitor for distribution updates to safeguard in opposition to these DNS threats.

As BIND evolves, such disclosures spotlight the necessity for proactive patching in crucial infrastructure.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attacks, BIND, Cache, Denial, DNS, Enable, Multiple, Poisoning, Service, Vulnerabilities

Post navigation

Previous Post: Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
Next Post: “Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

Related Posts

CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere Cyber Security News
Androxgh0st Botnet Operators Exploiting US University For Hosting C2 Logger Cyber Security News
Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes Cyber Security News
Threat Actors Compromise Xubuntu Website To Deliver Malicious Windows Executable Cyber Security News
New Beast Ransomware Actively Scans for Active SMB Port from Breached System to Spread Across Network Cyber Security News
48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks
  • Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
  • Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers
  • Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks
  • Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
  • Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers
  • Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark