CVE Vulnerabilities

CVE-2025-40780

Predictable from Observable State

Published: Oct 22, 2025 | Modified: Nov 04, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
8.6 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

Weakness

A number or object is predictable based on observations that the attacker can make about the state of the system or network, such as time, process ID, etc.

Affected Software

NameVendorStart VersionEnd Version
Red Hat Enterprise Linux 10RedHatbind-32:9.18.33-4.el10_0.2*
Red Hat Enterprise Linux 10RedHatbind-32:9.18.33-10.el10_1.2*
Red Hat Enterprise Linux 8RedHatbind9.16-32:9.16.23-0.22.el8_10.4*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatbind9.16-32:9.16.23-0.7.el8_6.9*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatbind9.16-32:9.16.23-0.7.el8_6.9*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatbind9.16-32:9.16.23-0.7.el8_6.9*
Red Hat Enterprise Linux 8.8 Telecommunications Update ServiceRedHatbind9.16-32:9.16.23-0.14.el8_8.7*
Red Hat Enterprise Linux 8.8 Update Services for SAP SolutionsRedHatbind9.16-32:9.16.23-0.14.el8_8.7*
Red Hat Enterprise Linux 9RedHatbind9.18-32:9.18.29-4.el9_6.2*
Red Hat Enterprise Linux 9RedHatbind-32:9.16.23-31.el9_6.2*
Red Hat Enterprise Linux 9RedHatbind-32:9.16.23-34.el9_7.1*
Red Hat Enterprise Linux 9RedHatbind9.18-32:9.18.29-5.el9_7.2*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatbind-32:9.16.23-1.el9_0.11*
Red Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRedHatbind-32:9.16.23-11.el9_2.9*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatbind-32:9.16.23-18.el9_4.10*
Red Hat OpenShift Container Platform 4.12RedHatrhcos-412.86.202601061735-0*
Red Hat OpenShift Container Platform 4.13RedHatrhcos-413.92.202601130113-0*
Red Hat OpenShift Container Platform 4.14RedHatrhcos-414.92.202601191325-0*
Red Hat OpenShift Container Platform 4.16RedHatrhcos-416.94.202601071926-0*
Red Hat OpenShift Container Platform 4.17RedHatrhcos-417.94.202601120213-0*
Red Hat OpenShift Container Platform 4.18RedHatrhcos-418.94.202601071817-0*
Red Hat OpenShift Container Platform 4.19RedHatrhcos-4.19.9.6.202601130152-0*
Red Hat OpenShift Container Platform 4.20RedHatrhcos-4.20.9.6.202601052146-0*
Red Hat Discovery 2RedHatdiscovery/discovery-ui-rhel9:sha256:69cb9c84b806ee2f448bdbbcf3174855432f5caec8f31ca2a345655da4a72f57*
Bind9Ubuntudevel*
Bind9Ubuntuesm-infra/bionic*
Bind9Ubuntuesm-infra/focal*
Bind9Ubuntujammy*
Bind9Ubuntunoble*
Bind9Ubuntuplucky*
Bind9Ubuntuquesting*
Bind9Ubuntuupstream*
Isc-dhcpUbuntuplucky*

Potential Mitigations

References