Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8677: CWE-405 Asymmetric Resource Consumption (Amplification) in ISC BIND 9

0
High
VulnerabilityCVE-2025-8677cvecve-2025-8677cwe-405
Published: Wed Oct 22 2025 (10/22/2025, 15:43:10 UTC)
Source: CVE Database V5
Vendor/Project: ISC
Product: BIND 9

Description

Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion. This issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

AI-Powered Analysis

AILast updated: 10/22/2025, 16:04:49 UTC

Technical Analysis

CVE-2025-8677 is a vulnerability classified as CWE-405 (Asymmetric Resource Consumption) affecting ISC BIND 9 DNS server software versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, and certain S1 patch versions. The flaw arises when the DNS server processes queries for records within specially crafted zones containing malformed DNSKEY records. These malformed records cause the DNS server to perform excessive CPU-intensive operations, leading to CPU exhaustion and effectively a denial-of-service (DoS) condition. The vulnerability can be triggered remotely without requiring authentication or user interaction, making it highly accessible to attackers. The attack exploits the asymmetric nature of the resource consumption, where a small query from an attacker results in disproportionately high CPU usage on the server side. This can degrade or completely disrupt DNS services, which are critical for network operations. The vulnerability does not impact confidentiality or integrity but severely affects availability. ISC has published the vulnerability with a CVSS v3.1 base score of 7.5, indicating high severity. No public exploits have been reported yet, but the potential for DoS attacks is significant given the widespread use of BIND 9 in DNS infrastructure globally. The lack of available patches at the time of disclosure necessitates immediate attention to monitoring and mitigation strategies.

Potential Impact

The primary impact of CVE-2025-8677 is on the availability of DNS services running ISC BIND 9 in affected versions. For European organizations, this can lead to significant operational disruptions, as DNS is foundational for internet and intranet communications, email delivery, and access to cloud services. Critical infrastructure operators, financial institutions, telecommunications providers, and large enterprises relying on BIND 9 for authoritative or recursive DNS resolution are particularly vulnerable. A successful exploitation could result in denial of service, causing downtime, loss of productivity, and potential cascading failures in dependent systems. Given the remote and unauthenticated nature of the exploit, attackers can launch large-scale or targeted DoS attacks with relative ease. This could also be leveraged as part of multi-vector attacks or to distract security teams during other intrusions. The impact is heightened in countries with dense internet infrastructure and high BIND deployment, where DNS service disruptions can affect large populations and critical services.

Mitigation Recommendations

1. Upgrade affected ISC BIND 9 installations to patched versions as soon as they become available from ISC. Monitor ISC advisories closely for patch releases. 2. In the interim, implement network-level filtering to block or rate-limit DNS queries containing DNSKEY records from untrusted sources or unusual zones, reducing exposure to malformed queries. 3. Deploy DNS query rate limiting and anomaly detection on DNS servers to identify and mitigate suspicious query patterns indicative of exploitation attempts. 4. Use DNS firewall or response policy zones (RPZ) to filter malicious or malformed DNS traffic. 5. Isolate DNS servers from direct exposure to untrusted networks where possible, placing them behind firewalls or dedicated DNS proxies that can inspect and filter traffic. 6. Monitor DNS server CPU usage and logs for unusual spikes or errors related to DNSKEY processing. 7. Conduct regular vulnerability assessments and penetration testing focused on DNS infrastructure to detect potential exploitation. 8. Prepare incident response plans specifically addressing DNS service disruptions and ensure rapid recovery capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
isc
Date Reserved
2025-08-06T17:32:34.755Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f8ffa56e01a0ac47e2cb6d

Added to database: 10/22/2025, 4:00:37 PM

Last enriched: 10/22/2025, 4:04:49 PM

Last updated: 10/22/2025, 8:49:48 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats