Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8677: CWE-405 Asymmetric Resource Consumption (Amplification) in ISC BIND 9

0
High
VulnerabilityCVE-2025-8677cvecve-2025-8677cwe-405
Published: Wed Oct 22 2025 (10/22/2025, 15:43:10 UTC)
Source: CVE Database V5
Vendor/Project: ISC
Product: BIND 9

Description

Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion. This issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:46:55 UTC

Technical Analysis

CVE-2025-8677 is a vulnerability classified under CWE-405 (Asymmetric Resource Consumption) affecting ISC BIND 9 DNS server software versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, and their service pack variants. The issue arises when the DNS server processes queries for records within specially crafted DNS zones containing malformed DNSKEY records. These malformed records cause the DNS server to consume excessive CPU resources during query processing, leading to CPU exhaustion. This asymmetric resource consumption can be exploited remotely without authentication or user interaction, making it a network-exploitable denial-of-service (DoS) vulnerability. The CVSS v3.1 base score is 7.5, reflecting high severity due to the impact on availability and ease of exploitation. The vulnerability does not affect confidentiality or integrity but can disrupt DNS services, which are critical for network operations. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed proactively. The root cause relates to improper handling and validation of DNSKEY records in the DNSSEC implementation of BIND 9, which is widely used in internet infrastructure. Attackers can craft malicious DNS zones or queries that trigger excessive CPU usage, potentially leading to service outages or degraded performance.

Potential Impact

For European organizations, the impact of CVE-2025-8677 can be significant due to the critical role DNS servers play in network operations and internet connectivity. Organizations using vulnerable versions of ISC BIND 9 as authoritative or recursive DNS servers may experience denial-of-service conditions, resulting in service outages or degraded network performance. This can affect internal applications, external-facing services, and overall business continuity. The disruption of DNS services can also impact email delivery, web services, and other critical infrastructure dependent on DNS resolution. Given the vulnerability requires no authentication and no user interaction, attackers can remotely launch DoS attacks from anywhere on the internet. This risk is heightened for organizations with publicly accessible DNS servers or those that accept queries from untrusted networks. The potential for widespread disruption is notable in sectors such as finance, telecommunications, government, and critical infrastructure providers across Europe. Additionally, DNS infrastructure providers and ISPs in Europe could be targeted to cause broader regional impact. The lack of known exploits in the wild currently provides a window for mitigation, but the vulnerability's nature demands urgent remediation to prevent future exploitation.

Mitigation Recommendations

1. Monitor ISC and trusted security advisories closely for official patches addressing CVE-2025-8677 and apply them promptly once released. 2. Until patches are available, implement rate limiting and query filtering on DNS servers to restrict queries for DNSKEY records or from suspicious sources to reduce exposure to malformed queries. 3. Deploy network-level protections such as firewalls and intrusion prevention systems (IPS) to detect and block anomalous DNS traffic patterns indicative of exploitation attempts. 4. Consider isolating DNS servers from direct internet exposure where possible, using DNS forwarders or recursive resolvers behind protective layers. 5. Review DNSSEC configurations and zone data for correctness to minimize the risk of malformed records triggering the vulnerability internally. 6. Conduct regular performance monitoring and alerting on DNS server CPU usage to detect early signs of exploitation or resource exhaustion. 7. Engage with DNS infrastructure providers and peers to share threat intelligence and coordinate defensive measures. 8. Prepare incident response plans specifically for DNS service disruptions to ensure rapid recovery and communication in case of an attack.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
isc
Date Reserved
2025-08-06T17:32:34.755Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f8ffa56e01a0ac47e2cb6d

Added to database: 10/22/2025, 4:00:37 PM

Last enriched: 11/4/2025, 10:46:55 PM

Last updated: 12/7/2025, 6:17:25 AM

Views: 152

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats