CVE-2025-40780
Rocky Linux vulnerability analysis and mitigation

Overview

A critical vulnerability (CVE-2025-40780) was discovered in BIND 9, affecting versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, and 9.21.0 through 9.21.12, along with various BIND Supported Preview Edition versions. The vulnerability, discovered by Prof. Amit Klein and Omer Ben Simhon from Hebrew University of Jerusalem, stems from a weakness in the Pseudo Random Number Generator (PRNG) implementation (ISC KB, NVD).

Technical details

The vulnerability is characterized by a weakness in the PRNG that allows attackers to predict the source port and query ID that BIND will use. It received a CVSS v3.1 base score of 8.6 (High), with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N. The issue specifically affects DNS resolvers, while authoritative services are believed to be unaffected (ISC KB, Ars Technica).

Impact

The vulnerability enables attackers to perform cache poisoning attacks by predicting BIND's source port and query ID. If successfully exploited, BIND can be tricked into caching attacker responses, potentially redirecting users to malicious destinations that are indistinguishable from legitimate ones. However, the impact is somewhat mitigated by existing security measures such as DNSSEC, rate limiting, and server firewalling (Ars Technica).

Mitigation and workarounds

The primary mitigation is to upgrade to the patched releases: BIND 9.18.41, 9.20.15, or 9.21.14. For BIND Supported Preview Edition users, patches are available in versions 9.18.41-S1 and 9.20.15-S1. No alternative workarounds are known (ISC KB).

Community reactions

The vulnerability has drawn significant attention from the security community, particularly due to its similarity to the historic 2008 Kaminsky DNS cache poisoning attack. Security experts have noted that while serious, the impact is less severe than the 2008 incident due to additional protective measures that remain in place (Ars Technica).

Additional resources


SourceThis report was generated using AI

Related Rocky Linux vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14330CRITICAL9.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox_esr
NoYesDec 09, 2025
CVE-2025-14329HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
NoYesDec 09, 2025
CVE-2025-14328HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox
NoYesDec 09, 2025
CVE-2025-14333HIGH8.1
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025
CVE-2025-14331MEDIUM6.5
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management