Skip to main content

CVE-2025-40777: CWE-617 Reachable Assertion in ISC BIND 9

High
VulnerabilityCVE-2025-40777cvecve-2025-40777cwe-617
Published: Wed Jul 16 2025 (07/16/2025, 17:38:06 UTC)
Source: CVE Database V5
Vendor/Project: ISC
Product: BIND 9

Description

If a `named` caching resolver is configured with `serve-stale-enable` `yes`, and with `stale-answer-client-timeout` set to `0` (the only allowable value other than `disabled`), and if the resolver, in the process of resolving a query, encounters a CNAME chain involving a specific combination of cached or authoritative records, the daemon will abort with an assertion failure. This issue affects BIND 9 versions 9.20.0 through 9.20.10, 9.21.0 through 9.21.9, and 9.20.9-S1 through 9.20.10-S1.

AI-Powered Analysis

AILast updated: 07/16/2025, 18:01:15 UTC

Technical Analysis

CVE-2025-40777 is a high-severity vulnerability affecting ISC BIND 9, a widely used DNS server software. The issue arises when a caching resolver configured with 'serve-stale-enable' set to 'yes' and 'stale-answer-client-timeout' set to '0' processes DNS queries involving a CNAME chain with a particular combination of cached or authoritative records. Under these conditions, the BIND daemon ('named') encounters an assertion failure and aborts unexpectedly. This vulnerability is classified under CWE-617 (Reachable Assertion), indicating that the software contains an assertion that can be triggered by crafted input, causing a denial of service (DoS) by crashing the resolver. Affected versions include BIND 9.20.0 through 9.20.10, 9.21.0 through 9.21.9, and the service pack versions 9.20.9-S1 through 9.20.10-S1. The vulnerability requires no privileges or user interaction and can be triggered remotely by sending specially crafted DNS queries that exploit the CNAME chain handling logic. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (denial of service). No known exploits are reported in the wild as of the publication date. The root cause is a reachable assertion failure in the code path handling stale DNS answers and CNAME chains, which causes the daemon to abort, disrupting DNS resolution services.

Potential Impact

For European organizations, this vulnerability poses a significant risk to DNS infrastructure stability, especially for those relying on ISC BIND 9 as their authoritative or caching DNS resolver. A successful exploitation results in a denial of service, causing the DNS resolver to crash and potentially leading to service outages or degraded network performance. This can disrupt internal and external communications, affect web services, email delivery, and other critical applications dependent on DNS resolution. Organizations with high availability requirements or those operating critical infrastructure could face operational disruptions and potential financial losses. Additionally, DNS outages can have cascading effects on security monitoring and incident response capabilities that rely on DNS data. Since the vulnerability can be triggered remotely without authentication, it increases the attack surface for threat actors aiming to cause disruption or conduct denial-of-service attacks against European entities.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately review and update BIND 9 deployments to versions later than 9.21.9 or apply any ISC patches once available, as no official patches were listed at publication. 2) Temporarily disable 'serve-stale-enable' or avoid setting 'stale-answer-client-timeout' to '0' until patches are applied, as this configuration triggers the vulnerability. 3) Implement network-level protections such as rate limiting and DNS query filtering to reduce exposure to malicious crafted queries exploiting CNAME chains. 4) Monitor DNS server logs for abnormal crashes or assertion failures indicative of exploitation attempts. 5) Employ redundant DNS resolvers with diverse software stacks to maintain service continuity during potential outages. 6) Coordinate with DNS service providers and upstream resolvers to ensure they are not vulnerable or to receive updates. 7) Conduct internal audits of DNS configurations to identify and remediate risky settings related to stale answer serving. These steps go beyond generic advice by focusing on configuration adjustments and operational monitoring specific to this vulnerability's trigger conditions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
isc
Date Reserved
2025-04-16T08:44:49.856Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6877e564a83201eaacdcef2d

Added to database: 7/16/2025, 5:46:12 PM

Last enriched: 7/16/2025, 6:01:15 PM

Last updated: 7/17/2025, 1:20:31 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats