Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-3119
PUBLISHED
More InfoOfficial Page
Assigner-isc
Assigner Org ID-404fd4d2-a609-4245-b543-2c944a302a22
View Known Exploited Vulnerability (KEV) details
Published At-25 Mar, 2026 | 13:31
Updated At-25 Mar, 2026 | 14:13
Rejected At-
▼CVE Numbering Authority (CNA)
Authenticated query containing a TKEY record may cause named to terminate unexpectedly

Under certain conditions, `named` may crash when processing a correctly signed query containing a TKEY record. The affected code can only be reached if an incoming request has a valid transaction signature (TSIG) from a key declared in the `named` configuration. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.

Affected Products
Vendor
Internet Systems Consortium, Inc.ISC
Product
BIND 9
Default Status
unaffected
Versions
Affected
  • From 9.20.0 through 9.20.20 (custom)
  • From 9.21.0 through 9.21.19 (custom)
  • From 9.20.9-S1 through 9.20.20-S1 (custom)
Unaffected
  • From 9.18.0 through 9.18.46 (custom)
  • From 9.18.11-S1 through 9.18.46-S1 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-617CWE-617 Reachable Assertion
Type: CWE
CWE ID: CWE-617
Description: CWE-617 Reachable Assertion
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
N/AIf this situation is encountered, `named` will terminate unexpectedly.
CAPEC ID: N/A
Description: If this situation is encountered, `named` will terminate unexpectedly.
Solutions

Upgrade to the patched release most closely related to your current version of BIND 9: 9.20.21, 9.21.20, or 9.20.21-S1.

Configurations

Workarounds

Remove any TSIG keys that might be used by an attacker.

Exploits

We are not aware of any active exploits.

Credits

ISC would like to thank Vitaly Simonovich for bringing this vulnerability to our attention.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://kb.isc.org/docs/cve-2026-3119
vendor-advisory
https://downloads.isc.org/isc/bind9/9.20.21
patch
https://downloads.isc.org/isc/bind9/9.21.20
patch
Hyperlink: https://kb.isc.org/docs/cve-2026-3119
Resource:
vendor-advisory
Hyperlink: https://downloads.isc.org/isc/bind9/9.20.21
Resource:
patch
Hyperlink: https://downloads.isc.org/isc/bind9/9.21.20
Resource:
patch
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found