CVE-2025-40780

Published: October 23, 2025Last modified: October 24, 2025

Description

In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

Severity score breakdown

ParameterValue
Base score8.6
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeCHANGED
ConfidentialityNONE
Integrity impactHIGH
Availability impactNONE
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSbindFixed (9.18.41-r0)
25 LTSbindFixed (9.20.15-r0)
StreambindFixed (9.20.15-r0)

References

ON THIS PAGE