Skip to content

BIND9 Important Updates - 20251112003

Overview

Internet Systems Consortium (ISC) have released a security advisory relating to a vulnerability identified in BIND9's DNS solution via its cache, poisoning attacks with unsolicited RRs. Successful exploitation could allow an attacker to remotely inject forged records data into the cache during a query, which can potentially affect resolution of future queries.

What is vulnerable?

Product(s) Affected Version(s) CVE CVSS Severity
BIND 9.11.x prior to 9.16.50
9.18.x prior to 9.18.39
9.20.x prior to 9.20.13
9.21.x prior to 9.21.12
CVE-2025-8677
CVE-2025-40778
CVE-2025-40780
8.6
8.6
8.6
High
High
High

What has been observed?

ISC have noted "Versions prior to 9.11.0 were not specifically assessed but are also believed to be affected" within their advisory. Tenable has noted one or more of the mentioned vulnerabilities as having an exploitation maturity of "Exploitation Available". The WA SOC has not received any reports of exploitation of this vulnerability on Western Australian Government networks at the time of writing.

Recommendation

The WASOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframes (refer Patch Management):