CVE-2025-40777: CWE-617 Reachable Assertion in ISC BIND 9
If a `named` caching resolver is configured with `serve-stale-enable` `yes`, and with `stale-answer-client-timeout` set to `0` (the only allowable value other than `disabled`), and if the resolver, in the process of resolving a query, encounters a CNAME chain involving a specific combination of cached or authoritative records, the daemon will abort with an assertion failure. This issue affects BIND 9 versions 9.20.0 through 9.20.10, 9.21.0 through 9.21.9, and 9.20.9-S1 through 9.20.10-S1.
AI Analysis
Technical Summary
CVE-2025-40777 is a reachable assertion vulnerability (CWE-617) found in ISC BIND 9, a widely used DNS server software. The issue specifically affects versions 9.20.0 through 9.20.10, 9.21.0 through 9.21.9, and service pack versions 9.20.9-S1 through 9.20.10-S1. The vulnerability manifests when the named daemon is configured with the serve-stale-enable option set to yes and stale-answer-client-timeout set to 0, which is the only allowed value besides disabled. Under these conditions, if the resolver encounters a CNAME chain involving a particular combination of cached or authoritative DNS records during query resolution, the daemon triggers an assertion failure and aborts. This results in a denial-of-service (DoS) condition as the DNS service becomes unavailable. The vulnerability requires no authentication or user interaction and can be triggered remotely by sending crafted DNS queries that exploit the specific CNAME chain scenario. While the vulnerability does not compromise confidentiality or integrity of DNS data, it severely impacts availability, potentially disrupting DNS resolution services. No public exploits have been reported yet, but the CVSS score of 7.5 (high severity) reflects the significant risk posed by this flaw. The ISC has not yet published patches at the time of this report, but mitigation can involve disabling serve-stale or adjusting the stale-answer-client-timeout setting to avoid the vulnerable configuration. This vulnerability is critical for organizations relying on BIND 9 for DNS caching and resolution, especially those using the serve-stale feature for improved DNS resilience.
Potential Impact
The primary impact of CVE-2025-40777 is a denial-of-service condition affecting DNS availability. For European organizations, this can lead to significant operational disruptions as DNS is foundational for network communications, service accessibility, and security controls. Organizations using affected BIND versions with the vulnerable configuration risk unexpected DNS server crashes, resulting in downtime or degraded network performance. This can affect internal services, customer-facing applications, and critical infrastructure reliant on DNS. In sectors such as finance, telecommunications, government, and critical infrastructure, DNS outages can cause cascading failures and loss of trust. Additionally, attackers could exploit this vulnerability to launch targeted DoS attacks against specific organizations or DNS infrastructure providers. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational risk posed by service unavailability. European entities with large-scale DNS deployments or those providing DNS services to customers are particularly vulnerable to reputational and financial damage from such outages.
Mitigation Recommendations
To mitigate CVE-2025-40777, European organizations should first verify if their BIND 9 installations fall within the affected version ranges and if the serve-stale-enable option is set to yes with stale-answer-client-timeout configured to 0. Immediate mitigation steps include: 1) Temporarily disabling the serve-stale feature by setting serve-stale-enable to no, which removes the vulnerable code path. 2) Alternatively, adjusting stale-answer-client-timeout to a non-zero value or disabling it entirely to avoid triggering the assertion failure. 3) Monitoring DNS server logs for assertion failures or crashes indicative of exploitation attempts. 4) Planning and applying vendor patches or updates as soon as they become available from ISC. 5) Implementing DNS redundancy and failover mechanisms to minimize service disruption in case of a crash. 6) Restricting access to DNS resolvers to trusted clients or networks to reduce exposure to malicious queries. 7) Employing network-level protections such as rate limiting and anomaly detection to identify and block suspicious DNS traffic patterns. These targeted mitigations go beyond generic advice by focusing on configuration changes and operational controls specific to the vulnerability's trigger conditions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-40777: CWE-617 Reachable Assertion in ISC BIND 9
Description
If a `named` caching resolver is configured with `serve-stale-enable` `yes`, and with `stale-answer-client-timeout` set to `0` (the only allowable value other than `disabled`), and if the resolver, in the process of resolving a query, encounters a CNAME chain involving a specific combination of cached or authoritative records, the daemon will abort with an assertion failure. This issue affects BIND 9 versions 9.20.0 through 9.20.10, 9.21.0 through 9.21.9, and 9.20.9-S1 through 9.20.10-S1.
AI-Powered Analysis
Technical Analysis
CVE-2025-40777 is a reachable assertion vulnerability (CWE-617) found in ISC BIND 9, a widely used DNS server software. The issue specifically affects versions 9.20.0 through 9.20.10, 9.21.0 through 9.21.9, and service pack versions 9.20.9-S1 through 9.20.10-S1. The vulnerability manifests when the named daemon is configured with the serve-stale-enable option set to yes and stale-answer-client-timeout set to 0, which is the only allowed value besides disabled. Under these conditions, if the resolver encounters a CNAME chain involving a particular combination of cached or authoritative DNS records during query resolution, the daemon triggers an assertion failure and aborts. This results in a denial-of-service (DoS) condition as the DNS service becomes unavailable. The vulnerability requires no authentication or user interaction and can be triggered remotely by sending crafted DNS queries that exploit the specific CNAME chain scenario. While the vulnerability does not compromise confidentiality or integrity of DNS data, it severely impacts availability, potentially disrupting DNS resolution services. No public exploits have been reported yet, but the CVSS score of 7.5 (high severity) reflects the significant risk posed by this flaw. The ISC has not yet published patches at the time of this report, but mitigation can involve disabling serve-stale or adjusting the stale-answer-client-timeout setting to avoid the vulnerable configuration. This vulnerability is critical for organizations relying on BIND 9 for DNS caching and resolution, especially those using the serve-stale feature for improved DNS resilience.
Potential Impact
The primary impact of CVE-2025-40777 is a denial-of-service condition affecting DNS availability. For European organizations, this can lead to significant operational disruptions as DNS is foundational for network communications, service accessibility, and security controls. Organizations using affected BIND versions with the vulnerable configuration risk unexpected DNS server crashes, resulting in downtime or degraded network performance. This can affect internal services, customer-facing applications, and critical infrastructure reliant on DNS. In sectors such as finance, telecommunications, government, and critical infrastructure, DNS outages can cause cascading failures and loss of trust. Additionally, attackers could exploit this vulnerability to launch targeted DoS attacks against specific organizations or DNS infrastructure providers. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational risk posed by service unavailability. European entities with large-scale DNS deployments or those providing DNS services to customers are particularly vulnerable to reputational and financial damage from such outages.
Mitigation Recommendations
To mitigate CVE-2025-40777, European organizations should first verify if their BIND 9 installations fall within the affected version ranges and if the serve-stale-enable option is set to yes with stale-answer-client-timeout configured to 0. Immediate mitigation steps include: 1) Temporarily disabling the serve-stale feature by setting serve-stale-enable to no, which removes the vulnerable code path. 2) Alternatively, adjusting stale-answer-client-timeout to a non-zero value or disabling it entirely to avoid triggering the assertion failure. 3) Monitoring DNS server logs for assertion failures or crashes indicative of exploitation attempts. 4) Planning and applying vendor patches or updates as soon as they become available from ISC. 5) Implementing DNS redundancy and failover mechanisms to minimize service disruption in case of a crash. 6) Restricting access to DNS resolvers to trusted clients or networks to reduce exposure to malicious queries. 7) Employing network-level protections such as rate limiting and anomaly detection to identify and block suspicious DNS traffic patterns. These targeted mitigations go beyond generic advice by focusing on configuration changes and operational controls specific to the vulnerability's trigger conditions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- isc
- Date Reserved
- 2025-04-16T08:44:49.856Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6877e564a83201eaacdcef2d
Added to database: 7/16/2025, 5:46:12 PM
Last enriched: 11/4/2025, 9:47:21 PM
Last updated: 12/4/2025, 2:44:21 AM
Views: 195
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighCVE-2025-64055: n/a
UnknownCVE-2025-66404: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Flux159 mcp-server-kubernetes
MediumCVE-2025-66293: CWE-125: Out-of-bounds Read in pnggroup libpng
HighCVE-2025-65868: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.