Use-After-Free Vulnerability in BIND 9 by Internet Systems Consortium
CVE-2026-3593
7.4HIGH
What is CVE-2026-3593?
A use-after-free vulnerability has been identified in the DNS-over-HTTPS implementation of BIND 9, affecting several versions. This flaw can lead to various security issues, potentially allowing unauthorized access or manipulation of data. Users of BIND 9 should ensure they are running the latest patched versions to mitigate this concern.
Affected Version(s)
BIND 9 9.20.0 <= 9.20.22
BIND 9 9.21.0 <= 9.21.21
BIND 9 9.20.9-S1 <= 9.20.22-S1
References
CVSS V3.1
Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
ISC would like to thank Naresh Kandula Parmar (Nottiboy) for bringing this vulnerability to our attention.