We found results for “”
CVE-2025-40780
Good to know:
Date: October 22, 2025
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
Severity Score
Severity Score
Weakness Type (CWE)
Predictable from Observable State
CWE-341Top Fix
Upgrade Version
Upgrade to version https://gitlab.isc.org/isc-projects/bind9.git - v9.21.14;https://gitlab.isc.org/isc-projects/bind9.git - v9.20.15;https://gitlab.isc.org/isc-projects/bind9.git - v9.18.41
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | CHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


