Berkeley Internet Name Domain (BIND) affected by multiple vulnerabilities
THREAT LEVEL: Amber.
For a detailed advisory, download the pdf file here
The Internet Systems Consortium (ISC) has published security upgrades to address several vulnerabilities in the widely used Berkeley Internet Name Domain (BIND) server software.
An attacker could take advantage of some of these vulnerabilities to gain elevated privileges, cause BIND process to terminate, or cause DNS cache poisoning. None of these vulnerabilities have been known to be exploited in the wild so far.
All these vulnerabilities have been fixed in versions 9.16.27 & 9.18.1. Organizations should update them using the patch links below
Potential MITRE ATT&CK TTPs are:
TA0042: Resource Development
T1588: Obtain Capabilities
T1588.006: Obtain Capabilities: Vulnerabilities
TA0001: Initial Access
T1190: Exploit Public-Facing Application
TA0040: Impact
T1498: Network Denial of Service
T1498.001: Network Denial of Service: Direct Network Flood
TA0006: Credential Access
TA0009: Collection
T1557: Adversary-in-the-Middle
Vulnerability Details
Patch Link
References
https://kb.isc.org/docs/cve-2021-25220
https://kb.isc.org/docs/cve-2022-0635
https://kb.isc.org/docs/cve-2022-0667
https://kb.isc.org/docs/cve-2022-0396
https://www.cisa.gov/uscert/ncas/current-activity/2022/03/17/isc-releases-security-advisories-bind
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox