vulnerability

Amazon Linux 2023: CVE-2025-40780: Important priority package update for bind

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
Oct 22, 2025
Added
Nov 6, 2025
Modified
Nov 6, 2025

Description

A vulnerability was found in BIND resolvers caused by a weakness in the Pseudo Random Number Generator (PRNG). This weakness allows an attacker to potentially predict the source port and query ID used by BIND, enabling cache poisoning attacks. If successful, the attacker can inject malicious DNS responses into the resolver’s cache, causing clients to receive spoofed DNS data. Authoritative servers are generally unaffected, but recursive resolvers are exposed to this risk. Exploitation is remote and does not require user interaction.

Solutions

amazon-linux-2023-upgrade-bindamazon-linux-2023-upgrade-bind-chrootamazon-linux-2023-upgrade-bind-debuginfoamazon-linux-2023-upgrade-bind-debugsourceamazon-linux-2023-upgrade-bind-develamazon-linux-2023-upgrade-bind-dnssec-utilsamazon-linux-2023-upgrade-bind-dnssec-utils-debuginfoamazon-linux-2023-upgrade-bind-docamazon-linux-2023-upgrade-bind-libsamazon-linux-2023-upgrade-bind-libs-debuginfoamazon-linux-2023-upgrade-bind-licenseamazon-linux-2023-upgrade-bind-utilsamazon-linux-2023-upgrade-bind-utils-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.