BIND Vulnerabilities Allow Remote Denial of Service Attacks
Summary
CERT-Bund has issued a security advisory regarding multiple vulnerabilities in Internet Systems Consortium BIND software. These vulnerabilities, with a CVSS Base Score of 7.5, could allow remote attackers to perform denial-of-service attacks or bypass security measures. Affected versions include BIND <9.18.47, <9.20.21, and <9.21.20.
What changed
CERT-Bund has released security advisory WID-SEC-2026-0863 detailing critical vulnerabilities in Internet Systems Consortium BIND software, a widely used DNS server. The advisory highlights that remote attackers, authenticated or anonymous, can exploit these flaws to conduct denial-of-service (DoS) attacks or bypass security controls. The vulnerabilities have a CVSS Base Score of 7.5 (High) and a Temporal Score of 6.5 (Medium), indicating a significant security risk.
Organizations running affected versions of BIND, including specific versions on Fedora Linux and Ubuntu Linux, must take immediate action. The advisory indicates that mitigation is available, and users are strongly advised to update their BIND installations to patched versions (e.g., BIND >= 9.18.47, >= 9.20.21, >= 9.21.20). Failure to patch could lead to service disruptions and potential security breaches, impacting network availability and integrity.
What to do next
- Update Internet Systems Consortium BIND to the latest patched versions.
- Review system logs for any signs of exploitation related to these vulnerabilities.
- Implement network segmentation and access controls to limit potential attack vectors.
Source document (simplified)
[WID-SEC-2026-0863] Internet Systems Consortium BIND: Mehrere Schwachstellen CVSS Base Score 7.5 (hoch) CVSS Temporal Score 6.5 (mittel) Remoteangriff ja Datum 25.03.2026 Stand 26.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
BIND (Berkeley Internet Name Domain) ist ein Open-Source-Softwarepaket, das einen Domain-Name-System-Server implementiert.
Produkte
25.03.2026
- Fedora Linux
Ubuntu Linux
Internet Systems Consortium BIND <9.18.47
Internet Systems Consortium BIND <9.20.21
Internet Systems Consortium BIND <9.21.20
Angriff
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Internet Systems Consortium BIND ausnutzen, um einen Denial of Service Angriff durchzuführen oder Sicherheitsmaßnahmen zu umgehen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Named provisions
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.