Changeflow GovPing Data Privacy & Cybersecurity Multiple ISC BIND Vulnerabilities Disclosed
Priority review Notice Added Final

Multiple ISC BIND Vulnerabilities Disclosed

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published March 26th, 2026
Detected March 26th, 2026
Email

Summary

CERT-FR has issued a security advisory regarding multiple vulnerabilities discovered in ISC BIND software. These vulnerabilities could lead to data confidentiality breaches, security policy bypass, and remote denial-of-service attacks. Affected versions require immediate patching.

What changed

This advisory from France's national cybersecurity agency, CERT-FR, details multiple critical vulnerabilities found in various versions of ISC BIND, a widely used DNS server software. The vulnerabilities (CVE-2026-1519, CVE-2026-3104, CVE-2026-3119, CVE-2026-3591) can be exploited by attackers to compromise data confidentiality, bypass security policies, and cause remote denial-of-service.

Organizations using affected versions of BIND, including BIND Supported Preview Edition and standard BIND releases prior to specific patch versions (e.g., 9.20.21, 9.18.47), must immediately consult the ISC BIND security bulletins and apply the necessary patches. Failure to do so could result in significant security breaches, impacting network availability and data integrity.

What to do next

  1. Review affected BIND versions against the advisory details.
  2. Apply patches or upgrade BIND software to the recommended secure versions as per ISC BIND security bulletins.
  3. Monitor network for any signs of exploitation related to these vulnerabilities.

Source document (simplified)

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 26 mars 2026 N° CERTFR-2026-AVI-0360 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Multiples vulnérabilités dans ISC BIND

Gestion du document

| Référence | CERTFR-2026-AVI-0360 |
| Titre | Multiples vulnérabilités dans ISC BIND |
| Date de la première version | 26 mars 2026 |
| Date de la dernière version | 26 mars 2026 |
| Source(s) | Bulletin de sécurité ISC BIND cve-2026-1519 du 25 mars 2026
Bulletin de sécurité ISC BIND cve-2026-3104 du 25 mars 2026
Bulletin de sécurité ISC BIND cve-2026-3119 du 25 mars 2026
Bulletin de sécurité ISC BIND cve-2026-3591 du 25 mars 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risques

  • Atteinte à la confidentialité des données
  • Contournement de la politique de sécurité
  • Déni de service à distance

Systèmes affectés

  • BIND Supported Preview Edition versions 9.20.x antérieures à 9.20.21-S1
  • BIND Supported Preview Edition versions antérieures à 9.18.47-S1
  • BIND versions 9.20.x antérieures à 9.20.21
  • BIND versions 9.21.x antérieures à 9.21.20
  • BIND versions antérieures à 9.18.47

Résumé

De multiples vulnérabilités ont été découvertes dans ISC BIND. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 26 mars 2026 Version initiale

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-FR
Published
March 26th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
CERTFR-2026-AVI-0360

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology 5170 Telecommunications
Activity scope
DNS Services Network Security
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Network Security Vulnerability Management

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Optional. Personalizes your daily digest.

Free. Unsubscribe anytime.