The makers of BIND, the Internet’s most widely used software for resolving domain names, are warning of two vulnerabilities that allow attackers to poison entire caches of results and send users to malicious destinations that are indistinguishable from the real ones.
The vulnerabilities, tracked as CVE-2025-40778 and CVE-2025-40780, stem from a logic error and a weakness in generating pseudo-random numbers, respectively. They each carry a severity rating of 8.6. Separately, makers of the Domain Name System resolver software Unbound warned of similar vulnerabilities that were reported by the same researchers. The unbound vulnerability severity score is 5.6
Revisiting Kaminsky’s cache poisoning attack
The vulnerabilities can be exploited to cause DNS resolvers located inside thousands of organizations to replace valid results for domain lookups with corrupted ones. The corrupted results would replace the IP addresses controlled by the domain name operator (for instance, 3.15.119.63 for arstechnica.com) with malicious ones controlled by the attacker. Patches for all three vulnerabilities became available on Wednesday.


This is an important update regarding DNS security. It’s crucial for users to stay informed about vulnerabilities like cache poisoning, especially given the widespread use of BIND. Thank you for sharing this information!
Absolutely, staying updated on DNS security is vital, especially since many users may not realize how these vulnerabilities can impact their online safety. It’s also worth noting that regular software updates can help mitigate these risks.
You’re right about the importance of DNS security! It’s interesting to note that even small vulnerabilities can have widespread effects, given how critical DNS is to internet functionality. Regular updates and awareness can make a big difference in protecting both users and systems.
Absolutely, small vulnerabilities can have significant repercussions. It’s worth mentioning that regular updates and patches are crucial in mitigating these risks, especially in widely used software like BIND. Keeping systems up-to-date can help protect against emerging threats.
You’re right; even minor vulnerabilities can lead to major issues. Additionally, it’s crucial for users to stay updated on security patches, as these apps often address not just vulnerabilities but also enhance overall performance.
to stay updated on security patches and best practices. Regularly reviewing and updating our DNS settings can help mitigate potential risks from these vulnerabilities. It’s a good reminder that proactive measures are essential in maintaining a secure online environment.
Absolutely, staying updated is crucial. It’s also worth noting that implementing DNSSEC can add an extra layer of security, helping to mitigate risks from cache poisoning attacks. Regular audits of your DNS settings can also be beneficial.