For CVE-2025-40776, organizations should upgrade to BIND 9.18.38-S1 or 9.20.11-S1, or disable ECS by removing the ecs-zones option from named.conf. CVE-2025-40777 requires upgrading to BIND 9.20.11 or 9.21.10, with temporary workarounds including setting stale-answer-client-timeout off or stale-answer-enable no in configuration files. The vulnerabilities, identified as CVE-2025-40776 and CVE-2025-40777, pose significant security risks to DNS infrastructure, particularly for resolvers configured with specific advanced features. These vulnerabilities highlight the critical importance of maintaining updated DNS infrastructure, as both cache poisoning and denial-of-service attacks can severely compromise organizational security posture and service availability. Two critical vulnerabilities in the BIND 9 DNS resolver software are affecting organizations worldwide, with potential cache poisoning and denial-of-service attacks. CVE-2025-40776 (cache poisoning) and CVE-2025-40777 (denial-of-service) affecting BIND 9 resolvers.
This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 18 Jul 2025 08:10:12 +0000