Skip to main content

CVE-2025-40777: CWE-617 Reachable Assertion in ISC BIND 9

High
VulnerabilityCVE-2025-40777cvecve-2025-40777cwe-617
Published: Wed Jul 16 2025 (07/16/2025, 17:38:06 UTC)
Source: CVE Database V5
Vendor/Project: ISC
Product: BIND 9

Description

If a `named` caching resolver is configured with `serve-stale-enable` `yes`, and with `stale-answer-client-timeout` set to `0` (the only allowable value other than `disabled`), and if the resolver, in the process of resolving a query, encounters a CNAME chain involving a specific combination of cached or authoritative records, the daemon will abort with an assertion failure. This issue affects BIND 9 versions 9.20.0 through 9.20.10, 9.21.0 through 9.21.9, and 9.20.9-S1 through 9.20.10-S1.

AI-Powered Analysis

AILast updated: 07/24/2025, 01:03:24 UTC

Technical Analysis

CVE-2025-40777 is a high-severity vulnerability affecting ISC BIND 9, a widely used DNS server software. The flaw is a reachable assertion failure (CWE-617) that occurs when a caching resolver configured with 'serve-stale-enable' set to 'yes' and 'stale-answer-client-timeout' set to '0' processes DNS queries involving a specific combination of CNAME chains and cached or authoritative records. Under these conditions, the BIND daemon ('named') encounters an assertion failure and aborts, causing a denial of service (DoS) by crashing the DNS resolver process. This vulnerability affects BIND 9 versions 9.20.0 through 9.20.10, 9.21.0 through 9.21.9, and the security patch branches 9.20.9-S1 through 9.20.10-S1. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability (no confidentiality or integrity impact). No known exploits are currently reported in the wild, but the vulnerability could be triggered remotely by sending specially crafted DNS queries that cause the resolver to process problematic CNAME chains, leading to a crash. This can disrupt DNS resolution services, impacting dependent applications and services relying on the affected resolver. The vulnerability arises from improper handling of assertion conditions in the code path related to stale answer serving and CNAME chain resolution, indicating a logic flaw in the resolver's internal state management.

Potential Impact

For European organizations, this vulnerability poses a significant risk to DNS infrastructure stability, especially for those operating caching resolvers with the affected BIND 9 versions and configurations. DNS is critical for network operations, and resolver crashes can lead to denial of service, resulting in service outages, degraded user experience, and potential cascading failures in dependent systems. Organizations relying on BIND 9 as their primary or secondary DNS resolver, including ISPs, enterprises, and government agencies, may experience intermittent or prolonged DNS resolution failures. This can affect web services, email delivery, internal applications, and security controls that depend on DNS. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability disruption can still cause operational and reputational damage. Additionally, the ease of remote exploitation without authentication or user interaction increases the threat level. European sectors with critical infrastructure, financial services, and public administration are particularly sensitive to DNS availability issues, making timely mitigation essential.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately audit their DNS infrastructure to identify BIND 9 instances running affected versions (9.20.0 to 9.20.10, 9.21.0 to 9.21.9, and related security branches). 2) Review resolver configurations to check if 'serve-stale-enable' is set to 'yes' and 'stale-answer-client-timeout' is configured to '0', as this combination triggers the vulnerability. Consider disabling 'serve-stale' or adjusting 'stale-answer-client-timeout' to a non-zero value or 'disabled' if feasible. 3) Apply vendor patches or updates as soon as they become available, or upgrade to unaffected BIND 9 versions. 4) Implement network-level protections such as rate limiting and DNS query filtering to reduce exposure to malicious crafted queries. 5) Monitor DNS resolver logs and system stability for signs of crashes or assertion failures. 6) Employ redundancy in DNS infrastructure to maintain service continuity in case of resolver failure. 7) Engage with ISC support channels for official patches or workarounds if immediate upgrades are not possible. These steps go beyond generic advice by focusing on configuration parameters that directly influence exploitability and emphasizing proactive infrastructure auditing and monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
isc
Date Reserved
2025-04-16T08:44:49.856Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6877e564a83201eaacdcef2d

Added to database: 7/16/2025, 5:46:12 PM

Last enriched: 7/24/2025, 1:03:24 AM

Last updated: 8/27/2025, 1:25:23 PM

Views: 64

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats