Cache poisoning vulnerabilities found in 2 DNS resolving apps

Cache poisoning vulnerabilities found in 2 DNS resolving apps

The makers of BIND, the Internet’s most widely used software for resolving domain names, are warning of two vulnerabilities that allow attackers to poison entire caches of results and send users to malicious destinations that are indistinguishable from the real ones.

The vulnerabilities, tracked as CVE-2025-40778 and CVE-2025-40780, stem from a logic error and a weakness in generating pseudo-random numbers, respectively. They each carry a severity rating of 8.6. Separately, makers of the Domain Name System resolver software Unbound warned of similar vulnerabilities that were reported by the same researchers. The unbound vulnerability severity score is 5.6

Revisiting Kaminsky’s cache poisoning attack

The vulnerabilities can be exploited to cause DNS resolvers located inside thousands of organizations to replace valid results for domain lookups with corrupted ones. The corrupted results would replace the IP addresses controlled by the domain name operator (for instance, 3.15.119.63 for arstechnica.com) with malicious ones controlled by the attacker. Patches for all three vulnerabilities became available on Wednesday.

Read full article

Comments

7 Comments

  1. abbey.weissnat

    This is an important update regarding DNS security. It’s crucial for users to stay informed about vulnerabilities like cache poisoning, especially given the widespread use of BIND. Thank you for sharing this information!

  2. ehalvorson

    Absolutely, staying updated on DNS security is vital, especially since many users may not realize how these vulnerabilities can impact their online safety. It’s also worth noting that regular software updates can help mitigate these risks.

  3. murray.carter

    You’re right about the importance of DNS security! It’s interesting to note that even small vulnerabilities can have widespread effects, given how critical DNS is to internet functionality. Regular updates and awareness can make a big difference in protecting both users and systems.

  4. adonis28

    Absolutely, small vulnerabilities can have significant repercussions. It’s worth mentioning that regular updates and patches are crucial in mitigating these risks, especially in widely used software like BIND. Keeping systems up-to-date can help protect against emerging threats.

  5. ewald.morar

    You’re right; even minor vulnerabilities can lead to major issues. Additionally, it’s crucial for users to stay updated on security patches, as these apps often address not just vulnerabilities but also enhance overall performance.

  6. porter.harris

    to stay updated on security patches and best practices. Regularly reviewing and updating our DNS settings can help mitigate potential risks from these vulnerabilities. It’s a good reminder that proactive measures are essential in maintaining a secure online environment.

  7. xokuneva

    Absolutely, staying updated is crucial. It’s also worth noting that implementing DNSSEC can add an extra layer of security, helping to mitigate risks from cache poisoning attacks. Regular audits of your DNS settings can also be beneficial.

Leave a Reply to adonis28 Cancel reply

Your email address will not be published. Required fields are marked *