6.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
7 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
54.5%
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.
[
{
"vendor": "ISC",
"product": "BIND",
"versions": [
{
"version": "Open Source Branch 9.11 9.11.0 through versions before 9.11.37",
"status": "affected"
},
{
"version": "Development Branch 9.17 BIND 9.17 all version",
"status": "affected"
},
{
"version": "Open Source Branch 9.12-16 9.12.0 through versions before 9.16.27",
"status": "affected"
},
{
"version": "Open Source Branch 9.18 9.18.0",
"status": "affected"
},
{
"version": "Supported Preview Branch 9.11-S 9.11.0-S through versions before 9.11.37-S",
"status": "affected"
},
{
"version": "Supported Preview Branch 9.16-S 9.16.0-S through versions before 9.16.27-S",
"status": "affected"
}
]
}
]
cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
kb.isc.org/v1/docs/cve-2021-25220
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SXT7247QTKNBQ67MNRGZD23ADXU6E5U/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VX3I2U3ICOIEI5Y7OYA6CHOLFMNH3YQ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/API7U5E7SX7BAAVFNW366FFJGD6NZZKV/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DE3UAVCPUMAKG27ZL5YXSP2C3RIOW3JZ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/
security.gentoo.org/glsa/202210-25
security.netapp.com/advisory/ntap-20220408-0001/
supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220?language=en_US
6.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
7 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
54.5%