Vulnerability Description
When an incoming DNS protocol message includes a Transaction Signature (TSIG), BIND always checks it. If the TSIG contains an invalid value in the algorithm field, BIND immediately aborts with an assertion failure. This issue affects BIND 9 versions 9.20.0 through 9.20.8 and 9.21.0 through 9.21.7.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://kb.isc.org/docs/cve-2025-40775
- http://www.openwall.com/lists/oss-security/2025/05/21/1
- https://security.netapp.com/advisory/ntap-20250523-0001/
FAQ
What is CVE-2025-40775?
CVE-2025-40775 is a vulnerability with a CVSS score of 7.5 (HIGH). When an incoming DNS protocol message includes a Transaction Signature (TSIG), BIND always checks it. If the TSIG contains an invalid value in the algorithm field, BIND immediately aborts with an ass...
How severe is CVE-2025-40775?
CVE-2025-40775 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-40775?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.