CVE-2026-3591 – BIND 9 DNS Service

CVSS 5.4 MODERATE

“When DNS breaks, everything above it starts to fail.”

BIND 9 addressed multiple vulnerabilities affecting DNS query handling and service stability. These issues could allow attackers to disrupt DNS resolution or degrade service reliability through crafted requests. The vulnerabilities impact core DNS operations, increasing the risk of outages and degraded network performance.

CVE-2026-1519 has a CVSS score of 7.5, which is High severity. CVE-2026-3104 has a CVSS score of 7.5, which is High severity. CVE-2026-3119 has a CVSS score of 6.5, which is Medium severity. CVE-2026-3591 has a CVSS score of 5.4, which is Medium severity. There is no verified evidence of active exploitation or publicly available proof-of-concept code for these vulnerabilities. The patch improves how BIND processes DNS queries and handles malformed input, reducing the risk of service disruption and strengthening overall reliability.

Key Details

Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
CWE Classification
CWE-305
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.