CVE-2026-3119: CWE-617 Reachable Assertion in ISC BIND 9
Under certain conditions, `named` may crash when processing a correctly signed query containing a TKEY record. The affected code can only be reached if an incoming request has a valid transaction signature (TSIG) from a key declared in the `named` configuration. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.
AI Analysis
Technical Summary
CVE-2026-3119 is a vulnerability identified in ISC BIND 9 DNS server software, specifically affecting versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and related service pack versions. The flaw is a reachable assertion failure (CWE-617) triggered when the 'named' daemon processes a DNS query containing a TKEY record that is correctly signed with a TSIG key declared in the server's configuration. This means the vulnerable code path is only reachable if the incoming request has a valid transaction signature from a trusted key, which restricts exploitation to entities with authorized access or knowledge of the TSIG keys. When triggered, the assertion failure causes the 'named' process to crash, resulting in a denial-of-service condition that disrupts DNS resolution services. The vulnerability does not affect confidentiality or integrity but impacts availability. The attack vector is network-based, with low complexity, requiring privileges (knowledge of TSIG keys), and no user interaction. No public exploits or active exploitation have been reported as of the publication date. The vulnerability does not affect earlier BIND 9.18.x versions, which remain unaffected. ISC has not yet published patches at the time of this report, so mitigation relies on configuration and operational controls. Given the critical role of BIND in DNS infrastructure globally, this vulnerability poses a risk to organizations running affected versions, especially those exposing TSIG keys for DNS transaction authentication.
Potential Impact
The primary impact of CVE-2026-3119 is denial of service caused by the crash of the 'named' DNS server process. This can lead to DNS resolution failures for affected organizations, potentially disrupting internal and external network communications, application availability, and internet services dependent on DNS. Since exploitation requires valid TSIG keys, the risk is elevated in environments where TSIG keys are widely distributed or exposed, such as large enterprises, managed DNS providers, or multi-tenant hosting environments. Attackers with access to these keys could intentionally cause service outages, impacting business continuity and potentially leading to cascading failures in dependent systems. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact on DNS infrastructure can be significant, especially for critical services relying on BIND. The lack of known exploits reduces immediate risk, but the medium severity score and ease of triggering the crash with valid credentials mean organizations should act promptly. The scope includes all affected BIND 9 versions in active use, which are widely deployed in government, enterprise, and ISP networks worldwide.
Mitigation Recommendations
1. Upgrade BIND 9 to a fixed version once ISC releases patches addressing CVE-2026-3119. Monitor ISC advisories for patch availability. 2. Until patches are available, restrict access to TSIG keys strictly to trusted systems and personnel to minimize the risk of exploitation. 3. Review and tighten TSIG key management policies, including key rotation and limiting key distribution scope. 4. Implement network segmentation and firewall rules to limit which hosts can send TSIG-signed queries to the DNS servers. 5. Monitor DNS server logs for unusual TSIG-signed query patterns that could indicate exploitation attempts. 6. Consider deploying redundant DNS servers with unaffected versions (e.g., 9.18.x) or alternative DNS software to maintain availability during mitigation. 7. Use process supervision and automatic restart mechanisms for 'named' to reduce downtime if crashes occur. 8. Conduct internal penetration testing to validate the effectiveness of mitigations and identify any exposure of TSIG keys. These steps go beyond generic advice by focusing on TSIG key security, network controls, and operational resilience.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia, Netherlands, India, Brazil, Russia
CVE-2026-3119: CWE-617 Reachable Assertion in ISC BIND 9
Description
Under certain conditions, `named` may crash when processing a correctly signed query containing a TKEY record. The affected code can only be reached if an incoming request has a valid transaction signature (TSIG) from a key declared in the `named` configuration. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-3119 is a vulnerability identified in ISC BIND 9 DNS server software, specifically affecting versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and related service pack versions. The flaw is a reachable assertion failure (CWE-617) triggered when the 'named' daemon processes a DNS query containing a TKEY record that is correctly signed with a TSIG key declared in the server's configuration. This means the vulnerable code path is only reachable if the incoming request has a valid transaction signature from a trusted key, which restricts exploitation to entities with authorized access or knowledge of the TSIG keys. When triggered, the assertion failure causes the 'named' process to crash, resulting in a denial-of-service condition that disrupts DNS resolution services. The vulnerability does not affect confidentiality or integrity but impacts availability. The attack vector is network-based, with low complexity, requiring privileges (knowledge of TSIG keys), and no user interaction. No public exploits or active exploitation have been reported as of the publication date. The vulnerability does not affect earlier BIND 9.18.x versions, which remain unaffected. ISC has not yet published patches at the time of this report, so mitigation relies on configuration and operational controls. Given the critical role of BIND in DNS infrastructure globally, this vulnerability poses a risk to organizations running affected versions, especially those exposing TSIG keys for DNS transaction authentication.
Potential Impact
The primary impact of CVE-2026-3119 is denial of service caused by the crash of the 'named' DNS server process. This can lead to DNS resolution failures for affected organizations, potentially disrupting internal and external network communications, application availability, and internet services dependent on DNS. Since exploitation requires valid TSIG keys, the risk is elevated in environments where TSIG keys are widely distributed or exposed, such as large enterprises, managed DNS providers, or multi-tenant hosting environments. Attackers with access to these keys could intentionally cause service outages, impacting business continuity and potentially leading to cascading failures in dependent systems. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact on DNS infrastructure can be significant, especially for critical services relying on BIND. The lack of known exploits reduces immediate risk, but the medium severity score and ease of triggering the crash with valid credentials mean organizations should act promptly. The scope includes all affected BIND 9 versions in active use, which are widely deployed in government, enterprise, and ISP networks worldwide.
Mitigation Recommendations
1. Upgrade BIND 9 to a fixed version once ISC releases patches addressing CVE-2026-3119. Monitor ISC advisories for patch availability. 2. Until patches are available, restrict access to TSIG keys strictly to trusted systems and personnel to minimize the risk of exploitation. 3. Review and tighten TSIG key management policies, including key rotation and limiting key distribution scope. 4. Implement network segmentation and firewall rules to limit which hosts can send TSIG-signed queries to the DNS servers. 5. Monitor DNS server logs for unusual TSIG-signed query patterns that could indicate exploitation attempts. 6. Consider deploying redundant DNS servers with unaffected versions (e.g., 9.18.x) or alternative DNS software to maintain availability during mitigation. 7. Use process supervision and automatic restart mechanisms for 'named' to reduce downtime if crashes occur. 8. Conduct internal penetration testing to validate the effectiveness of mitigations and identify any exposure of TSIG keys. These steps go beyond generic advice by focusing on TSIG key security, network controls, and operational resilience.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- isc
- Date Reserved
- 2026-02-24T12:29:14.561Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c3eaa6f4197a8e3b5259ef
Added to database: 3/25/2026, 2:01:10 PM
Last enriched: 3/25/2026, 2:17:48 PM
Last updated: 3/26/2026, 5:38:52 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.