Asymmetric Resource Consumption (Amplification) Affecting bind package, versions [,9.18.41)[,9.20.15)[,9.21.14)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-BIND-13703825
  • published24 Oct 2025
  • disclosed22 Oct 2025
  • creditZuyao Xu and Xiang Li

Introduced: 22 Oct 2025

NewCVE-2025-8677  (opens in a new tab)
CWE-405  (opens in a new tab)

How to fix?

Upgrade bind to version 9.18.41, 9.20.15, 9.21.14 or higher.

Overview

Affected versions of this package are vulnerable to Asymmetric Resource Consumption (Amplification) via the DNSKEY record validation. An attacker can exhaust CPU resources and degrade resolver performance by sending zones with malformed DNSKEY records, resulting in service disruption for legitimate clients.

Workaround

This vulnerability can be mitigated by restricting recursive queries to trusted or internal networks, applying rate limiting or firewall rules to block excessive requests, enabling DNSSEC validation, isolating recursive resolvers from authoritative servers, and actively monitoring CPU usage and query volume for anomalies.

CVSS Base Scores

version 4.0
version 3.1