CVE-2026-1519 – BIND 9 DNS Service
“When DNS breaks, everything above it starts to fail.”
BIND 9 addressed multiple vulnerabilities affecting DNS query handling and service stability. These issues could allow attackers to disrupt DNS resolution or degrade service reliability through crafted requests. The vulnerabilities impact core DNS operations, increasing the risk of outages and degraded network performance.
CVE-2026-1519 has a CVSS score of 7.5, which is High severity. CVE-2026-3104 has a CVSS score of 7.5, which is High severity. CVE-2026-3119 has a CVSS score of 6.5, which is Medium severity. CVE-2026-3591 has a CVSS score of 5.4, which is Medium severity. There is no verified evidence of active exploitation or publicly available proof-of-concept code for these vulnerabilities. The patch improves how BIND processes DNS queries and handles malformed input, reducing the risk of service disruption and strengthening overall reliability.
Key Details
- Attack Vector
- Network
- Attack Complexity
- Low
- Privileges Required
- None
- User Interaction
- None
- CWE Classification
- CWE-606