Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks

Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks

Posted on October 23, 2025October 23, 2025 By CWS

The Web Methods Consortium (ISC) disclosed three high-severity vulnerabilities in BIND 9 on October 22, 2025, doubtlessly permitting distant attackers to conduct cache poisoning assaults or trigger denial-of-service (DoS) circumstances on affected DNS resolvers.

These flaws, tracked as CVE-2025-8677, CVE-2025-40778, and CVE-2025-40780, primarily influence recursive resolvers utilized by organizations for area identify decision, leaving authoritative DNS servers largely unaffected.

With BIND powering a good portion of the web’s DNS infrastructure, directors are urged to use patches instantly to mitigate dangers of service disruptions and malicious redirections.

Flaws Uncovered In Resolver Logic

CVE-2025-8677 includes useful resource exhaustion triggered by malformed DNSKEY information in specifically crafted zones, resulting in CPU overload on resolvers throughout queries.

Rated at a CVSS rating of seven.5, this vulnerability permits attackers to remotely overwhelm servers with out authentication, severely degrading efficiency for reliable customers.

ISC notes that whereas authoritative setups stay secure, resolvers in recursive mode are prime targets, echoing considerations from their information base on unintended question behaviors.

The opposite two points heart on cache poisoning, a method paying homage to the 2008 Dan Kaminsky assault that after threatened international DNS integrity.

CVE-2025-40778 (CVSS 8.6) stems from BIND’s overly permissive dealing with of unsolicited useful resource information in responses, permitting cast knowledge to infiltrate the cache and corrupt future resolutions.

Equally, CVE-2025-40780 (CVSS 8.6) exploits a weak pseudo-random quantity generator (PRNG), making supply ports and question IDs predictable for spoofing malicious replies into the cache.

Each flaws elevate the assault floor by enabling scope modifications in influence, as tainted caches may redirect site visitors throughout networks.

Researchers from Nankai College, Tsinghua College, and Hebrew College of Jerusalem recognized these points, crediting their work in ISC’s advisories.

No lively exploits are identified but, however the distant, unauthenticated nature heightens urgency given BIND’s widespread deployment.

Profitable exploitation may result in phishing, malware distribution, or man-in-the-middle assaults by diverting customers to attacker-controlled websites.

As an illustration, poisoned caches would possibly substitute reliable IP addresses with malicious ones, mimicking trusted domains and eroding consumer belief in on-line providers.

DoS from CVE-2025-8677 dangers operational downtime, monetary losses, and lowered productiveness for companies reliant on secure DNS.

Organizations utilizing weak variations spanning BIND 9.11.0 to 9.21.12 and Supported Preview Editions face elevated threats, particularly in cloud and enterprise environments.

ISC emphasizes that these vulnerabilities underscore ongoing DNS resilience challenges, even post-Kaminsky mitigations like randomized question IDs.

Distributions like Ubuntu and Pink Hat have begun issuing updates, with package deal maintainers inspired to launch patches swiftly.

Mitigations

No workarounds exist, so upgrading to fastened releases is important: BIND 9.18.41, 9.20.15, or 9.21.14 for normal branches, and corresponding Supported Preview variations.

Selective patches can be found in launch directories for these preferring minimal modifications. Directors ought to assessment ISC’s advisories and monitor for distribution updates to safeguard in opposition to these DNS threats.

As BIND evolves, such disclosures spotlight the necessity for proactive patching in crucial infrastructure.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attacks, BIND, Cache, Denial, DNS, Enable, Multiple, Poisoning, Service, Vulnerabilities

Post navigation

Previous Post: Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
Next Post: “Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

Related Posts

Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Cyber Security News
Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System Cyber Security News
Microsoft 365 PDF Export LFI Vulnerability Allows Access to Sensitive Server Data Microsoft 365 PDF Export LFI Vulnerability Allows Access to Sensitive Server Data Cyber Security News
New Arkanix Stealer Attacking Users to Steal VPN Accounts, Screenshots and Wi-Fi Credentials New Arkanix Stealer Attacking Users to Steal VPN Accounts, Screenshots and Wi-Fi Credentials Cyber Security News
Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks Cyber Security News
Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News