CVE-2022-2906: In BIND 9.18.0 -> 9.18.6 and versions 9.19.0 -> 9.19.4 of the BIND 9.19 development branch, changes between OpenSSL 1.x and OpenSSL 3.0 expose a flaw in named that causes a small memory leak in key processing when using TKEY records in Diffie-Hellman mode with OpenSSL 3.0.0 and later versions. in ISC BIND9
An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.
AI Analysis
Technical Summary
CVE-2022-2906 is a high-severity vulnerability affecting ISC BIND9 versions 9.18.0 through 9.18.6 and 9.19.0 through 9.19.4 (development branch). The flaw arises due to changes between OpenSSL 1.x and OpenSSL 3.0 that expose a memory leak in the named DNS server process when handling TKEY records in Diffie-Hellman mode with OpenSSL 3.0.0 or later. Specifically, the vulnerability is a small memory leak during key processing, which an attacker can exploit by repeatedly sending crafted TKEY requests. Over time, this leak gradually consumes available memory resources, eventually causing the named process to crash due to resource exhaustion. Although the service can be restarted, the attacker can repeatedly trigger the leak to cause a denial of service (DoS) condition. The vulnerability is classified under CWE-401 (Improper Release of Memory), indicating a failure to properly manage memory allocation and deallocation. The CVSS v3.1 base score is 7.5, reflecting a high severity with network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability (no confidentiality or integrity impact). No known exploits are currently reported in the wild, but the vulnerability's nature makes it a plausible target for DoS attacks against DNS infrastructure running vulnerable BIND versions with OpenSSL 3.0 or later. This issue is particularly relevant for organizations relying on BIND9 as their authoritative or recursive DNS server, especially where TKEY Diffie-Hellman key exchanges are enabled or used. The absence of patches at the time of reporting necessitates prompt attention to updates or mitigations once available.
Potential Impact
For European organizations, the impact of CVE-2022-2906 primarily manifests as a denial of service against DNS infrastructure. DNS is a critical service underpinning almost all network communications and internet services. A successful exploitation could cause DNS server crashes, leading to service outages, degraded network performance, or loss of domain resolution capabilities. This can disrupt internal and external communications, web services, email, and other dependent applications. Organizations with public-facing DNS servers or those providing DNS services to customers are at higher risk of reputational damage and operational disruption. Additionally, DNS outages can have cascading effects on security monitoring, incident response, and other dependent systems. Since the vulnerability requires no authentication or user interaction and can be exploited remotely over the network, it poses a significant risk to internet-facing DNS servers. European critical infrastructure sectors such as finance, telecommunications, government, and energy, which rely heavily on stable DNS services, could experience operational interruptions. However, the impact is limited to availability; there is no direct confidentiality or integrity compromise. The gradual nature of the memory leak means attacks may require sustained effort but can be automated. Organizations using OpenSSL 3.0 with vulnerable BIND versions are specifically at risk, which may be more common in environments adopting newer OpenSSL releases.
Mitigation Recommendations
1. Immediate mitigation involves upgrading BIND9 to versions 9.18.7 or later and 9.19.5 or later once patches are released by ISC, as these versions address the memory leak issue. 2. Until patches are available, consider disabling TKEY Diffie-Hellman key exchanges if feasible, to prevent triggering the vulnerable code path. 3. Monitor DNS server memory usage and named process stability closely to detect abnormal memory growth or crashes indicative of exploitation attempts. 4. Implement network-level protections such as rate limiting or filtering of TKEY DNS queries from untrusted sources to reduce attack surface. 5. Employ DNS firewalling or intrusion detection systems capable of identifying anomalous DNS traffic patterns associated with exploitation attempts. 6. Maintain updated inventories of DNS server software versions and OpenSSL dependencies to ensure timely patch management. 7. For critical DNS infrastructure, consider deploying redundant DNS servers with failover capabilities to minimize service disruption during attacks or maintenance. 8. Engage with ISC security advisories and community channels to receive timely updates on patches and mitigation guidance.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Finland
CVE-2022-2906: In BIND 9.18.0 -> 9.18.6 and versions 9.19.0 -> 9.19.4 of the BIND 9.19 development branch, changes between OpenSSL 1.x and OpenSSL 3.0 expose a flaw in named that causes a small memory leak in key processing when using TKEY records in Diffie-Hellman mode with OpenSSL 3.0.0 and later versions. in ISC BIND9
Description
An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.
AI-Powered Analysis
Technical Analysis
CVE-2022-2906 is a high-severity vulnerability affecting ISC BIND9 versions 9.18.0 through 9.18.6 and 9.19.0 through 9.19.4 (development branch). The flaw arises due to changes between OpenSSL 1.x and OpenSSL 3.0 that expose a memory leak in the named DNS server process when handling TKEY records in Diffie-Hellman mode with OpenSSL 3.0.0 or later. Specifically, the vulnerability is a small memory leak during key processing, which an attacker can exploit by repeatedly sending crafted TKEY requests. Over time, this leak gradually consumes available memory resources, eventually causing the named process to crash due to resource exhaustion. Although the service can be restarted, the attacker can repeatedly trigger the leak to cause a denial of service (DoS) condition. The vulnerability is classified under CWE-401 (Improper Release of Memory), indicating a failure to properly manage memory allocation and deallocation. The CVSS v3.1 base score is 7.5, reflecting a high severity with network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability (no confidentiality or integrity impact). No known exploits are currently reported in the wild, but the vulnerability's nature makes it a plausible target for DoS attacks against DNS infrastructure running vulnerable BIND versions with OpenSSL 3.0 or later. This issue is particularly relevant for organizations relying on BIND9 as their authoritative or recursive DNS server, especially where TKEY Diffie-Hellman key exchanges are enabled or used. The absence of patches at the time of reporting necessitates prompt attention to updates or mitigations once available.
Potential Impact
For European organizations, the impact of CVE-2022-2906 primarily manifests as a denial of service against DNS infrastructure. DNS is a critical service underpinning almost all network communications and internet services. A successful exploitation could cause DNS server crashes, leading to service outages, degraded network performance, or loss of domain resolution capabilities. This can disrupt internal and external communications, web services, email, and other dependent applications. Organizations with public-facing DNS servers or those providing DNS services to customers are at higher risk of reputational damage and operational disruption. Additionally, DNS outages can have cascading effects on security monitoring, incident response, and other dependent systems. Since the vulnerability requires no authentication or user interaction and can be exploited remotely over the network, it poses a significant risk to internet-facing DNS servers. European critical infrastructure sectors such as finance, telecommunications, government, and energy, which rely heavily on stable DNS services, could experience operational interruptions. However, the impact is limited to availability; there is no direct confidentiality or integrity compromise. The gradual nature of the memory leak means attacks may require sustained effort but can be automated. Organizations using OpenSSL 3.0 with vulnerable BIND versions are specifically at risk, which may be more common in environments adopting newer OpenSSL releases.
Mitigation Recommendations
1. Immediate mitigation involves upgrading BIND9 to versions 9.18.7 or later and 9.19.5 or later once patches are released by ISC, as these versions address the memory leak issue. 2. Until patches are available, consider disabling TKEY Diffie-Hellman key exchanges if feasible, to prevent triggering the vulnerable code path. 3. Monitor DNS server memory usage and named process stability closely to detect abnormal memory growth or crashes indicative of exploitation attempts. 4. Implement network-level protections such as rate limiting or filtering of TKEY DNS queries from untrusted sources to reduce attack surface. 5. Employ DNS firewalling or intrusion detection systems capable of identifying anomalous DNS traffic patterns associated with exploitation attempts. 6. Maintain updated inventories of DNS server software versions and OpenSSL dependencies to ensure timely patch management. 7. For critical DNS infrastructure, consider deploying redundant DNS servers with failover capabilities to minimize service disruption during attacks or maintenance. 8. Engage with ISC security advisories and community channels to receive timely updates on patches and mitigation guidance.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- isc
- Date Reserved
- 2022-08-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68372bbe182aa0cae2520258
Added to database: 5/28/2025, 3:29:02 PM
Last enriched: 7/7/2025, 8:40:14 AM
Last updated: 7/29/2025, 9:38:24 AM
Views: 13
Related Threats
CVE-2025-8310: CWE-862 Missing Authorization in Ivanti Virtual Application Delivery ControllerCWE-862
MediumCVE-2025-8297: CWE-434 Unrestricted Upload of File with Dangerous Type in Ivanti Avalanche
HighCVE-2025-8296: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Ivanti Avalanche
HighCVE-2025-22834: CWE-665 Improper Initialization in AMI AptioV
MediumCVE-2025-22830: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in AMI AptioV
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.