Excessive CPU Consumption Vulnerability in BIND Resolver by ISC
CVE-2026-1519
7.5HIGH
What is CVE-2026-1519?
A vulnerability in the BIND resolver allows a maliciously crafted DNS zone to cause excessive CPU consumption during DNSSEC validation. Although generally authoritative-only servers are unaffected, scenarios exist in which these servers could make recursive queries, potentially leading to degraded performance or service interruptions. Specific affected versions include BIND 9.11.0 to 9.16.50, 9.18.0 to 9.18.46, 9.20.0 to 9.20.20, and 9.21.0 to 9.21.19, among others. It is crucial for administrators to review their configurations and apply necessary patches to mitigate this issue.
Affected Version(s)
BIND 9 9.11.0 <= 9.16.50
BIND 9 9.18.0 <= 9.18.46
BIND 9 9.20.0 <= 9.20.20
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
ISC would like to thank Samy Medjahed/Ap4sh for bringing this vulnerability to our attention.