October 24 Advisory: BIND 9 Resolver Enables Cache Poisoning Via Unsolicited Answers [CVE-2025-40778]

Rapid Response

Update 10/27/25

Previous versions of this advisory overestimated the number of affected servers due to only keying off versions, however only recursive resolvers are affected. Numbers have been updated to reflect more accurate counts.

Vulnerability Description: 

A flaw in a BIND 9 resolver allows it to accept and cache DNS records that were not requested in the original DNS query. An off-path attacker capable of spoofing or racing responses could inject forged address information into the cache. After the cache is poisoned, users relying on the resolver may be redirected to attacker-controlled systems without new DNS queries being made.

FieldDescription
CVE-IDCVE-2025-40778 — CVSS 8.6 — assigned by Internet Systems Consortium (ISC)
Vulnerability DescriptionA vulnerability in a BIND 9 resolver allows it to accept and cache resource records that weren’t part of the original query. An off-path attacker could inject forged address data into the resolver cache by racing or spoofing responses. This cache poisoning enables the redirection of downstream clients to attacker-controlled infrastructure without triggering fresh lookups. 
Date of DisclosureOctober 22, 2025
Affected AssetsISC Bind 9 resolver 
Vulnerable Software Versions9.11.0 – 9.16.509.18.0 – 9.18.399.20.0 – 9.20.139.21.0 – 9.21.12
PoC Available?A PoC was published on GitHub.
Exploitation Status At time of writing, there has been no known exploitation.
Patch StatusUpgrade to patched: 9.18.41, 9.20.15, 9.21.14 (or newer). Restrict recursion to trusted clients; enable DNSSEC validation and monitor caches.
cve-2025-40778-countries.png
Vulnerable instances by country

See the full breakdown in Censys Platform –>

cve-2025-40778-sw-versions.png
Vulnerable instances by software version

See the breakdown of vulnerable instances by software version –> 

Censys Perspective 

As of the time of writing, Censys sees 5,912 vulnerable instances. Use the following queries to find vulnerable BIND 9 resolvers.

Platform:

host.services: (software: (vendor: “ISC” and product: “BIND” and ((version>=”9.11.0″ and version<=”9.16.50″) or (version>=”9.18.0″ and version<=”9.18.39″) or (version>=”9.20.0″ and version<=”9.20.13″) or (version>=”9.21.0″ and version<=”9.21.12″))) and dns.server_type = “RECURSIVE_RESOLVER”)

Legacy Search:

services: (software: (vendor: “ISC” and product: “BIND” and version: [9.11.0 to 9.16.50] or version: [9.18.0 to 9.18.39] or version: [9.20.0 to 9.20.13] or version: [9.21.0 to 9.21.12]) and dns.server_type=”RECURSIVE_RESOLVER”)

ASM:

risks.name: “Vulnerable ISC Bind9 [CVE-2025-40778]”

Subscribe to our blog