Data Injection Vulnerability in BIND Software by ISC
CVE-2025-40778
Key Information:
Badges
What is CVE-2025-40778?
CVE-2025-40778 is a significant data injection vulnerability found in the BIND software developed by the Internet Systems Consortium (ISC). BIND (Berkeley Internet Name Domain) is a widely used Domain Name System (DNS) server software that plays a crucial role in translating domain names into IP addresses, which is essential for internet functionality. This vulnerability arises from BIND's excessive leniency in validating certain response records, allowing an attacker to inject malicious data into the DNS cache. If successfully exploited, this flaw could lead to erroneous behavior in DNS responses, potentially redirecting users to malicious sites or compromising data integrity, thereby exposing organizations to extensive risks, including data breaches and operational disruptions.
Potential Impact of CVE-2025-40778
-
Data Integrity Compromise: Exploitation of this vulnerability may enable attackers to inject forged DNS responses, leading to possible rerouting of users to malicious sites. This can ultimately compromise the integrity of data, causing severe reputational damage and loss of customer trust.
-
Operational Disruption: Organizations relying on BIND for their DNS services might experience disruptions in service due to the manipulation of DNS queries or responses, which can result in downtime and loss of business continuity.
-
Increased Risk of Malware Attacks: The ability to inject malicious data into the DNS cache opens up avenues for further attacks, including the distribution of ransomware and other payloads. This can lead to additional security incidents and financial losses as organizations grapple with the aftermath of such compromises.
Affected Version(s)
BIND 9 9.11.0 <= 9.16.50
BIND 9 9.18.0 <= 9.18.39
BIND 9 9.20.0 <= 9.20.13
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
Week in review: WSUS vulnerability exploited to drop Skuld infostealer, PoC for BIND 9 DNS flaw published - Help Net Security
Hereโs an overview of some of last weekโs most interesting news, articles, interviews and videos: Can your earbuds recognize you? Researchers are working
Public Exploit Code Released for Critical BIND 9 DNS Vulnerability | eSecurity Planet
A public exploit for a critical BIND 9 flaw renews DNS cache-poisoning risk, enabling forged records and traffic redirection.

ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising
Threat actors refine tactics with DNS attacks, new RATs, and Rust-based malware. Stay ahead with this weekโs top ThreatsDay intelligence brief.
References
CVSS V3.1
Timeline
- ๐ก
Public PoC available
- ๐ฐ
Used in Ransomware
- ๐
Vulnerability started trending
- ๐พ
Exploit known to exist
- ๐ฐ
First article discovered by Ars Technica
Vulnerability published
Vulnerability Reserved