A high-severity vulnerability (CVE-2025-40778) affecting BIND 9 DNS resolvers could be leveraged by remote, unauthenticated attackers to manipulate DNS entries via cache poisoning, allowing them to redirect Internet traffic to potentially malicious sites, distribute malware, or intercept network traffic. While attackers have yet to be spotted exploiting the flaw, a proof-of-concept (PoC) exploit code has been published, making it critical for administrators to patch internet-facing resolvers. What is BIND 9? BIND (v)9 is the latest … More
The post PoC code drops for remotely exploitable BIND 9 DNS flaw (CVE-2025-40778) appeared first on Help Net Security.
This article has been indexed from Help Net Security
Read the original article: