
Cloud Vulnerability DB
A community-led vulnerabilities database
A cache poisoning vulnerability (CVE-2021-25220) was discovered in BIND versions 9.11.0 through 9.11.36, 9.12.0 through 9.16.26, 9.17.0 through 9.18.0, and BIND Supported Preview Editions. The vulnerability affects BIND when using forwarders, where bogus NS records supplied by the forwarders may be cached and used by name servers (ISC KB, MITRE CVE).
The vulnerability exists in BIND's DNS forwarding functionality where incorrect records could be cached, leading to queries being directed to the wrong servers. The issue has been assigned a CVSS base score of 6.8 (MEDIUM) with a vector of CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N (NetApp Advisory).
When successfully exploited, this vulnerability could result in the DNS cache becoming poisoned with incorrect records, potentially causing queries to be made to incorrect servers and false information being returned to clients. This could lead to addition or modification of DNS data (Red Hat CVE).
The vulnerability has been fixed in subsequent releases of BIND. Organizations should upgrade to patched versions of the software. For BIND 9.16.x, upgrade to version 9.16.27 or later. For BIND 9.11.x, upgrade to version 9.11.37 or later (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."