Categories: Cyber Security News

PoC Exploit Released for BIND 9 Vulnerability that Let Attackers Forge DNS Records

A public exploit code demonstrating how attackers could exploit CVE-2025-40778, a critical vulnerability in BIND 9 that enables DNS cache poisoning.

The Internet Systems Consortium (ISC) initially disclosed this flaw on October 22, revealing a dangerous weakness in the world’s most widely used DNS software.

The vulnerability allows remote, unauthenticated attackers to inject forged DNS records into resolver caches, potentially redirecting millions of users to malicious infrastructure without any user interaction or special network access.

DNS Cache Poisoning Vulnerability Bypasses

The flaw affects supported BIND 9 versions ranging from 9.11.0 through 9.21.14, impacting any resolver performing recursive queries. Fortunately, authoritative-only servers remain unaffected by this issue.

The vulnerability exploits BIND’s handling of unsolicited resource records, allowing attackers to bypass modern DNS security defenses that were implemented following the infamous 2008 Kaminsky vulnerability.

That earlier flaw led to randomized query IDs and source ports, protections that CVE-2025-40778 circumvents entirely.

CVE Details Information
CVE ID CVE-2025-40778
Affected Versions BIND 9.11.0 through 9.21.12
Vulnerability Type DNS Cache Poisoning
CVSS v3.1 Score 8.6 (High)

By crafting specially formatted DNS responses, attackers can poison resolver caches and redirect legitimate traffic to attacker-controlled servers.

The attack carries a CVSS 3.1 severity score of 8.6, classified as high severity, reflecting its potential for widespread impact across internet infrastructure.

The consequences of successful exploitation could be severe. Attackers could redirect all DNS traffic from an affected resolver to malicious endpoints, enabling phishing campaigns, malware distribution, and traffic interception.

Given BIND’s ubiquitous role in internet operations, a single compromised resolver could affect thousands or millions of downstream users and systems. ISC has released patched versions addressing this vulnerability: version 9.18.41, 9.20.15, and 9.21.14.

The company responsible coordinated disclosure through a responsible timeline, issuing early notifications on October 8, revising patch details on October 15, and finalizing disclosure on October 22. Unfortunately, no known workarounds exist for this vulnerability, making immediate patching the only effective mitigation strategy.

As of October 28, no active exploitation in the wild has been confirmed, though the public release of exploit code significantly increases the likelihood of opportunistic attacks.

Security administrators managing recursive DNS resolvers should prioritize immediate upgrades to patched versions matching their deployed BIND installations.

Organizations should implement Domain Name System Security Extensions (DNSSEC) where feasible and conduct comprehensive audits of resolver configurations to ensure recursive queries are disabled on authoritative-only servers.

Network monitoring for anomalous DNS behavior and rapid deployment of security patches remain critical for minimizing exposure to this threat.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post PoC Exploit Released for BIND 9 Vulnerability that Let Attackers Forge DNS Records appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

GameCube Classic Pokémon XD: Gale of Darkness is Now Available to Play on Nintendo Switch 2

Fan-favorite Pokémon series Pokémon XD: Gale of Darkness is now available to play again via…

14 minutes ago

Sony Reportedly Issuing Automatic Refunds For Additional Content Bought For Short-Lived Live Service, Highguard

Sony is issuing automatic refunds to players who paid for additional content in Highguard. Highguard…

15 minutes ago

Control Developer Remedy Releases Final Update for Beleaguered Multiplayer Spinoff FBC: Firebreak, Lowers Price and Launches Friend Pass

Alan Wake developer Remedy has launched its final update to FBC: Firebreak, its Control multiplayer…

15 minutes ago

Crimson Desert Global Release Time Confirmed as Preload Goes Live

Crimson Desert developer and publisher Pearl Abyss has confirmed the global release time for the…

15 minutes ago

This Avatar: The Last Airbender Beginner Set is Magic’s Best Entry Point Right Now, and It’s Suddenly Dirt Cheap

Avatar: The Last Airbender might not be the newest Universes Beyond release anymore after the…

16 minutes ago

Abilene ISD names Lyndsey Williamson associate superintendent for curriculum & instruction

ABILENE, Texas (KTAB/KRBC) - Lyndsey Williamson has been named associate superintendent for curriculum and instruction…

1 hour ago

This website uses cookies.