Berkeley Internet Name Domain (BIND) affected by multiple vulnerabilities

Threat Level – Amber | Vulnerability Report
Download PDF

THREAT LEVEL: Amber.

For a detailed advisory, download the pdf file here

The Internet Systems Consortium (ISC) has published security upgrades to address several vulnerabilities in the widely used Berkeley Internet Name Domain (BIND) server software.

An attacker could take advantage of some of these vulnerabilities to gain elevated privileges, cause BIND process to terminate, or cause DNS cache poisoning.  None of these vulnerabilities have been known to be exploited in the wild so far.

All these vulnerabilities have been fixed in versions 9.16.27 & 9.18.1. Organizations should update them using the patch links below

Potential MITRE ATT&CK TTPs are:

TA0042: Resource Development

T1588: Obtain Capabilities

T1588.006: Obtain Capabilities: Vulnerabilities

TA0001: Initial Access

T1190: Exploit Public-Facing Application

TA0040: Impact

T1498: Network Denial of Service

T1498.001: Network Denial of Service: Direct Network Flood

TA0006: Credential Access

TA0009: Collection

T1557: Adversary-in-the-Middle

Vulnerability Details

Patch Link

https://www.isc.org/bind/

References

https://kb.isc.org/docs/cve-2021-25220

https://kb.isc.org/docs/cve-2022-0635

https://kb.isc.org/docs/cve-2022-0667

https://kb.isc.org/docs/cve-2022-0396

https://www.cisa.gov/uscert/ncas/current-activity/2022/03/17/isc-releases-security-advisories-bind

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox