[CIVN-2026-0171] Multiple Vulnerabilities in ISC BIND

By Published On: April 7, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in ISC BIND


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


ISC BIND versions 9.11.0 through 9.16.50

ISC BIND versions 9.18.0 through 9.18.46

ISC BIND versions 9.20.0 through 9.20.20

ISC BIND versions 9.21.0 through 9.21.19

ISC BIND Supported Preview Edition 9.11.3.S1 through 9.16.50.S1

ISC BIND Supported Preview Edition 9.18.11.S1 through 9.18.46.S1

ISC BIND Supported Preview Edition 9.20.9.S1 through 9.20.20.S1

Note: (Versions prior to 9.11.0 were not assessed.)


Overview


Multiple vulnerabilities have been reported in ISC BIND which could allow a remote attacker to cause CPU exhaustion, which could lead to Denial of Service (DoS), ACL bypass, unauthorized access or memory leak on the targeted system.


Target Audience:

All end-user organizations and individuals using ISC BIND.


Risk Assessment:

Risk of remote code execution, denial of service, unauthorized access and memory leak.


Impact Assessment:

Authoritative servers and Resolvers are affected by these vulnerabilities.


Description


ISC BIND is an open-source software that implements the Domain Name System (DNS) protocols for resolving domain names to IP addresses.


Multiple vulnerabilities exist in ISC BIND which could allow a remote attacker to cause excessive CPU utilization, ACL bypass, unauthorized access and/or memory leak on the targeted server with specially crafted requests.


Successful exploitation of these vulnerabilities could allow a remote attacker to trigger denial of service condition, gain elevated privileges and memory leak on the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor:

https://kb.isc.org/docs/cve-2026-1519


https://kb.isc.org/docs/cve-2026-3591


https://kb.isc.org/docs/cve-2026-3119


https://kb.isc.org/docs/cve-2026-3104



Vendor Information


ISC BIND

https://kb.isc.org/


References


ISC BIND

https://kb.isc.org/docs/cve-2026-1519

https://kb.isc.org/docs/cve-2026-3591

https://kb.isc.org/docs/cve-2026-3119

https://kb.isc.org/docs/cve-2026-3104


CVE Name

CVE-2026-1519

CVE-2026-3591

CVE-2026-3119

CVE-2026-3104




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnVIFYACgkQ3jCgcSdc

ys/OJhAAnH2m6wEwCnZeuHCSYBIosrP47nHpnMv1HqYdLuwQg5oSeU29LuUKqTR4

MiwdGYBI+lDkLk4MEV1JuFB1XCnyOsyXy9pHpBeJJSgSyI1h42Yor/Q0CrcBILwB

RbZJzB4juIEA+dFWqHf3XI+rgfY8Nvhj+2cfPUmwjjLmTGNEoAEYS9gFhvmLdqN3

+G0hnVlBkpfcDbN0Lxj7I2mhSYe0AHqLjLlGMzsH8VhNYwHCgjn33muwugyZntmX

8K+VUL6WtWDiGqAgx7Z5SVS78cfpSfOKhfilMOCClZ6fyf05EkB0V+99xUCJeqYq

fItvQ/sJpC17+VVSh5xz5mIGXTZfx9ebP8xG2Y3yJPymFWUaoMCTOPPdUQ+QuYgu

f6vDZnx+sQNcXgQ4nb802QB6hydoCLBM4MqU7qZSCpqO73TlYLweSeURJaP6e+he

8SgBbRWXYyXJj5ewcks/TFNSd2HY+LPbJbcTLivEUm9ReMUhmNmeH4fc8cPBzTm7

Tdm0XEreQL4ZOJd2KXniG7tqq/rS27oYMWAIXJ0AWTR2Ng9wNsK4EPINVU9c0xzV

Axkd3fP4qh6ALs7vEPOcqiqC23s7g11jjM4WD8B+JhSLEdycdBBHFMBtOslpHNQi

Gz2DcfRNn2PeXFr7o8tE8hOq1Sj/WvhGYlqiXG6LT1imzjpMFxM=

=iJi5

—–END PGP SIGNATURE—–

Share this article